Cleartext Credential Storage Vulnerability in MailEnable
CVE-2025-34427

8.4HIGH

Key Information:

Vendor

Mailenable

Vendor
CVE Published:
10 December 2025

What is CVE-2025-34427?

MailEnable versions prior to 10.54 are susceptible to a vulnerability that involves the storage of user and administrative credentials in plaintext format within the AUTH.TAB file. This misconfiguration allows local authenticated users with read access to gain unauthorized access to user passwords and super-admin credentials. Consequently, these credentials can be exploited to access MailEnable services such as POP3, SMTP, and the webmail interface, resulting in potential account takeover and unauthorized administrative control over mailboxes.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

MailEnable 0 < 10.54

References

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

MushroomSecTeam (Spotify, AmirSUN, M30Brad, Hannah Green, av01t3x, PG)
.