<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MailEnable — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/mailenable/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 21:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/mailenable/feed.xml" rel="self" type="application/rss+xml"/><item><title>MailEnable Enterprise Premium Authentication Bypass Vulnerability (CVE-2026-44400)</title><link>https://feed.craftedsignal.io/briefs/2026-05-mailenable-auth-bypass/</link><pubDate>Fri, 08 May 2026 21:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mailenable-auth-bypass/</guid><description>MailEnable Enterprise Premium 10.55 and earlier is vulnerable to CVE-2026-44400, an improper authorization vulnerability that allows attackers to bypass authentication checks and perform administrative actions by reusing AuthenticationToken cookies.</description><content:encoded><![CDATA[<p>MailEnable Enterprise Premium, versions 10.55 and earlier, contains an improper authorization vulnerability in its WebAdmin mobile portal. This flaw, identified as CVE-2026-44400, allows attackers to bypass authentication by exploiting the way AuthenticationToken cookies are handled. By obtaining a valid token from the WebMail login endpoint, even with low-privileged credentials, an attacker can replay this token against the WebAdmin portal, effectively escalating their privileges. This can lead to unauthorized access to sensitive administrative functions. Defenders should prioritize patching to the latest version or implementing mitigations to prevent unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a MailEnable Enterprise Premium server running a vulnerable version (&lt;= 10.55).</li>
<li>The attacker creates a low-privileged user account on the MailEnable server.</li>
<li>The attacker logs into the WebMail interface using the low-privileged account and the <code>PersistentLogin</code> parameter. This generates a valid AuthenticationToken cookie.</li>
<li>The attacker intercepts the AuthenticationToken cookie from the WebMail session.</li>
<li>The attacker crafts a malicious HTTP request targeting the WebAdmin portal.</li>
<li>The attacker injects the stolen AuthenticationToken cookie into the crafted HTTP request.</li>
<li>The attacker sends the modified request to the WebAdmin portal, bypassing authentication checks.</li>
<li>The attacker successfully performs administrative actions on the MailEnable server due to the elevated privileges gained through the authorization bypass.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44400 allows an unauthenticated attacker to perform arbitrary administrative actions on the affected MailEnable server. This could lead to complete compromise of the email server, including access to all email accounts, sensitive data, and system configurations. The vulnerability poses a significant risk to organizations relying on MailEnable for email services, potentially leading to data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade MailEnable Enterprise Premium to a version higher than 10.55 to patch CVE-2026-44400.</li>
<li>Monitor web server logs for suspicious requests to the WebAdmin portal containing manipulated AuthenticationToken cookies. Use the Sigma rule <code>Detect MailEnable WebAdmin Authentication Bypass Attempt</code> for this purpose.</li>
<li>Implement network segmentation to restrict access to the WebAdmin portal from untrusted networks.</li>
<li>Enforce strong password policies and multi-factor authentication for all MailEnable accounts to mitigate the risk of credential theft.</li>
<li>Deploy the Sigma rule <code>Detect MailEnable WebMail PersistentLogin Use</code> to identify suspicious usage of the <code>PersistentLogin</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>authentication-bypass</category><category>privilege-escalation</category></item></channel></rss>