Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.1
GFI MailEssentials AI 22.4 and Earlier: Malicious Code Injection via URI DNS Blocklist
CVE-2026-23613
Summary
GFI MailEssentials AI versions before 22.4 have a security flaw that allows an attacker to inject malicious code into the system's configuration page. An authenticated user can enter and store malicious code, which can be executed when a logged-in user views the page. To protect your system, update to version 22.4 or later as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| gfi | mailessentials | <= 22.4 | – |
Original title
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the URI DNS Blocklist configuration page. An authenticated user can supply HTML/JavaScript in the...
Original description
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the URI DNS Blocklist configuration page. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv1$TXB_URIs parameter to /MailEssentials/pages/MailSecurity/uridnsblocklist.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.
nvd CVSS3.1
5.4
nvd CVSS4.0
5.1
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026