Cleartext Credential Storage Vulnerability in MailEnable
CVE-2025-34427

6.8MEDIUM

Key Information:

Vendor

Mailenable

Vendor
CVE Published:
10 December 2025

What is CVE-2025-34427?

MailEnable versions prior to 10.54 are susceptible to a vulnerability that involves the storage of user and administrative credentials in plaintext format within the AUTH.TAB file. This misconfiguration allows local authenticated users with read access to gain unauthorized access to user passwords and super-admin credentials. Consequently, these credentials can be exploited to access MailEnable services such as POP3, SMTP, and the webmail interface, resulting in potential account takeover and unauthorized administrative control over mailboxes.

Affected Version(s)

MailEnable 0 < 10.54

References

CVSS V4

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

MushroomSecTeam (Spotify, AmirSUN, M30Brad, Hannah Green, av01t3x, PG)
.
CVE-2025-34427 : Cleartext Credential Storage Vulnerability in MailEnable