Arbitrary Code Execution Vulnerability in MailEnable Software
CVE-2025-34421

8.5HIGH

Key Information:

Vendor

Mailenable

Vendor
CVE Published:
10 December 2025

What is CVE-2025-34421?

MailEnable versions before 10.54 are prone to a vulnerability that permits local arbitrary code execution due to unsafe DLL loading practices. The administrative executable of MailEnable loads the MEAISP.DLL file from its own installation directory without verifying its integrity or enforcing a secure search order. This flaw allows a local attacker with write permissions to the installation directory to place a harmful MEAISP.DLL file. Once the executable is run, it loads the malicious DLL, enabling the attacker to execute their code under the privileges of the MailEnable process, thereby compromising the system.

Affected Version(s)

MailEnable 0 < 10.54

References

CVSS V4

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

MushroomSecTeam (Spotify, AmirSUN, M30Brad, Hannah Green, av01t3x, PG)
.
CVE-2025-34421 : Arbitrary Code Execution Vulnerability in MailEnable Software