Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.1

GFI MailEssentials AI: Stored JavaScript Injection Risk in Management Interface

CVE-2026-23614
Summary

An attacker with a GFI MailEssentials AI account can inject malicious JavaScript code into the management interface, potentially allowing them to steal sensitive information or take control of the system. To protect your organization, update to version 22.4 or later. This vulnerability can be exploited by an authorized user, so ensure all users are trained on safe practices when using the management interface.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
gfi mailessentials <= 22.4
Original title
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the Sender Policy Framework IP Exceptions interface. An authenticated user can supply HTML/JavaSc...
Original description
GFI MailEssentials AI versions prior to 22.4 contain a stored cross-site scripting vulnerability in the Sender Policy Framework IP Exceptions interface. An authenticated user can supply HTML/JavaScript in the ctl00$ContentPlaceHolder1$pv2$txtIPDescription parameter to /MailEssentials/pages/MailSecurity/SenderPolicyFramework.aspx, which is stored and later rendered in the management interface, allowing script execution in the context of a logged-in user.
nvd CVSS3.1 5.4
nvd CVSS4.0 5.1
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026