An issue WinMail v.7.1 and v.5.1 and before allows a remote attacker to execute arbitrary code via a crafted script to the email parameter.
References
| Link | Resource |
|---|---|
| https://gist.github.com/Drun1baby/8270239bed2952dbd99cc8d4262728e8 | Third Party Advisory |
| https://gist.github.com/Drun1baby/8270239bed2952dbd99cc8d4262728e8 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Sep 2025, 16:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Winmail
Winmail winmail |
|
| References | () https://gist.github.com/Drun1baby/8270239bed2952dbd99cc8d4262728e8 - Third Party Advisory | |
| CPE | cpe:2.3:a:winmail:winmail:*:*:*:*:-:*:*:* cpe:2.3:a:winmail:winmail:*:*:*:*:pro:*:*:* |
13 Mar 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-284 |
Information
Published : 2024-03-09 08:15
Updated : 2025-09-18 16:29
NVD link : CVE-2024-25501
Mitre link : CVE-2024-25501
CVE.ORG link : CVE-2024-25501
JSON object : View
Products Affected
winmail
- winmail
CWE
CWE-284
Improper Access Control
