Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.1
GFI MailEssentials AI versions 22.4 and earlier allow unauthorized code execution
CVE-2026-23611
Summary
GFI MailEssentials AI versions prior to 22.4 contain a security flaw that allows an authenticated user to inject malicious code that can execute in the context of a logged-in user. This could potentially allow an attacker to take control of the system. Affected users should update to version 22.4 or later to fix the issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| gfi | mailessentials | <= 22.4 | – |
Original title
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the IP Blocklist management page. An authenticated user can supply HTML/JavaScript in the ctl00$C...
Original description
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the IP Blocklist management page. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv1$txtIPDescription parameter to /MailEssentials/pages/MailSecurity/ipblocklist.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.
nvd CVSS3.1
5.4
nvd CVSS4.0
5.1
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026