Generated remediation guidance and an executive summary. No account required.
In MailEnable Enterprise Premium 10.23, the potential cross-site request forgery (CSRF) protection mechanism was not implemented correctly and it was possible to bypass it by removing the anti-CSRF token parameter from the request. This could allow an attacker to manipulate a user into unwittingly performing actions within the application (such as sending email, adding contacts, or changing settings) on behalf of the attacker.
Use CWE-352, Mailenable vendor hub and Mailenable product page to widen CVE-2019-12923 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-34424, CVE-2025-34423 and CVE-2025-34422 for nearby disclosures in the same product family.