Arbitrary Code Execution Vulnerability in MailEnable Software
CVE-2025-34421
8.5HIGH
What is CVE-2025-34421?
MailEnable versions before 10.54 are prone to a vulnerability that permits local arbitrary code execution due to unsafe DLL loading practices. The administrative executable of MailEnable loads the MEAISP.DLL file from its own installation directory without verifying its integrity or enforcing a secure search order. This flaw allows a local attacker with write permissions to the installation directory to place a harmful MEAISP.DLL file. Once the executable is run, it loads the malicious DLL, enabling the attacker to execute their code under the privileges of the MailEnable process, thereby compromising the system.
Affected Version(s)
MailEnable 0 < 10.54
References
CVSS V4
Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
MushroomSecTeam (Spotify, AmirSUN, M30Brad, Hannah Green, av01t3x, PG)
