HomeAxigenCVE-2025-68643

CVE-2025-68643

MEDIUM
5.4CVSS
Published: 2026-02-05
Updated: 2026-02-11
AI Analysis

Description

Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the timeFormat account preference parameter. Attackers can exploit this by deploying a multi-stage attack. In the first stage, a malicious JavaScript payload is injected into the timeFormat preference by exploiting a separate vulnerability or using compromised credentials. In the second stage, when the victim logs into the WebMail interface, the unsanitized timeFormat value is loaded from storage and inserted into the DOM, causing the injected script to execute.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
changed
Confidentiality
low
Integrity
low
Availability
none
Weaknesses
CWE-79CWE-79

Metadata

Primary Vendor
AXIGEN
Published
2/5/2026
Last Modified
2/11/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

axigen : axigen_mail_serveraxigen : axigen_mail_server

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-68643 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com