MDaemon Email Server: Cross-Site Scripting (XSS) Vulnerability in Webmail Component
CVE-2024-11182 Published on November 15, 2024
Stored XSS vulnerability in MDaemon Email Server
An XSS issue was discovered in
MDaemon Email Server before version 24.5.1c. An attacker can send an HTML e-mail message
with
JavaScript in an img tag. This could
allow a remote attacker
to load arbitrary JavaScript code in the context of a webmail user's browser window.
Known Exploited Vulnerability
This MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. MDaemon Email Server contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to load arbitrary JavaScript code via an HTML e-mail message.
The following remediation steps are recommended / required by June 9, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2024-11182 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2024-11182
Want to know whenever a new CVE is published for Mdaemon? stack.watch will email you.
Affected Versions
MDaemon Email Server:- Before and including 24.5.0 is affected.
- Version 24.5.1 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.