MDaemon Email Server: Cross-Site Scripting (XSS) Vulnerability in Webmail Component
CVE-2024-11182 Published on November 15, 2024

Stored XSS vulnerability in MDaemon Email Server
An XSS issue was discovered in MDaemon Email Server before version 24.5.1c. An attacker can send an HTML e-mail message with JavaScript in an img tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window.

NVD

Known Exploited Vulnerability

This MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. MDaemon Email Server contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to load arbitrary JavaScript code via an HTML e-mail message.

The following remediation steps are recommended / required by June 9, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Type

What is a XSS Vulnerability?

The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE-2024-11182 has been classified to as a XSS vulnerability or weakness.


Products Associated with CVE-2024-11182

Want to know whenever a new CVE is published for Mdaemon? stack.watch will email you.

 

Affected Versions

MDaemon Email Server:

Exploit Probability

EPSS
15.32%
Percentile
94.65%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.