Seppmail Vulnerabilities
Comprehensive security vulnerability database for Seppmail products
3
3
5
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-2748 | 7.8 | This vulnerability allows an attacker to spoof email signatures, making it look like an email comes from a trusted source. It occurs when the SEPPmail Secure Email Gateway improperly handles S/MIME certificates for email addresses that include spaces, which means attackers can exploit this flaw if they can create such certificates. | seppmailseppmail | Exploit Available | about 1 month agoMar 4, 2026 |
| CVE-2026-27444 | 7.8 | This vulnerability allows an attacker to spoof the sender's email address or decrypt emails by exploiting how the SEPPmail Secure Email Gateway handles email headers. It affects versions before 15.0.1, meaning users running older versions are at risk if they receive emails that take advantage of this flaw. | seppmailseppmail | Theoretical | about 1 month agoMar 4, 2026 |
| CVE-2026-27443 | 8.2 | This vulnerability allows an attacker to manipulate trusted email headers in SEPPmail Secure Email Gateway, potentially leading to phishing attacks or other malicious activities. It affects versions prior to 15.0.1 and requires the attacker to send specially crafted S/MIME protected emails to exploit the flaw. | seppmailseppmail | Theoretical | about 1 month agoMar 4, 2026 |
About Seppmail Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Seppmail products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.