Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
SEPPmail Email Gateway: Malicious Email Source Spoofing
CVE-2026-27444
Summary
A flaw in the SEPPmail Email Gateway software before version 15.0.1 can allow malicious emails to appear as if they come from a trusted sender. This can lead to emails being delivered incorrectly, and potentially allow an attacker to intercept sensitive information. Update to version 15.0.1 or later to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| seppmail | seppmail | <= 15.0.1 | – |
Original title
SEPPmail Secure Email Gateway before version 15.0.1 incorrectly interprets email addresses in the email headers, causing an interpretation conflict with other mail infrastructure that allows an att...
Original description
SEPPmail Secure Email Gateway before version 15.0.1 incorrectly interprets email addresses in the email headers, causing an interpretation conflict with other mail infrastructure that allows an attacker to fake the source of the email or decrypt it.
nvd CVSS3.1
7.5
nvd CVSS4.0
7.8
Vulnerability type
CWE-436
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026