LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-44400

CVE-2026-44400 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: May 8, 2026

MailEnable Enterprise Premium - Authentication Bypass

Published: May 8, 2026Updated: May 8, 2026Remote Exploitable

Overview

MailEnable Enterprise Premium <= 10.55 contains an authentication bypass caused by reuse of AuthenticationToken cookies from low-privileged users in the WebAdmin mobile portal, letting attackers perform privileged administrative actions, exploit requires obtaining a token via PersistentLogin parameter.

Severity & Score

Severity: High
CVSS Score: 8.1

Impact

Attackers can perform highly privileged administrative actions by bypassing authentication checks.

Mitigation

Update to the latest version beyond 10.55.

Details

CVE ID
CVE-2026-44400
Severity
High
CVSS Score
8.1
Type
broken_authentication
Status
new

CWE

  • CWE-639

CVSS Metrics

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H