Active! Mail < 6.60.05008562 Remote Code Execution

critical Web App Scanning Plugin ID 114942

Synopsis

Active! Mail < 6.60.05008562 Remote Code Execution

Description

According to its banner, the version of Active! Mail running on the remote host is < 6.60.05008562. It is, therefore, affected by a Remote Code Execution through a a stack-based buffer overflow vulnerability.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Active! Mail version 6.60.05008562 or later.

See Also

https://www.qualitia.com/jp/news/2025/04/18_1030.html

Plugin Details

Severity: Critical

ID: 114942

Type: remote

Published: 8/11/2025

Updated: 8/11/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-42599

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2025-42599

Vulnerability Information

CPE: cpe:2.3:a:qualitia:active\!_mail:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 4/17/2025

CISA Known Exploited Vulnerability Due Dates: 5/19/2025

Reference Information

CVE: CVE-2025-42599