Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the timeFormat account preference parameter. Attackers can exploit this by deploying a multi-stage attack. In the first stage, a malicious JavaScript payload is injected into the timeFormat preference by exploiting a separate vulnerability or using compromised credentials. In the second stage, when the victim logs into the WebMail interface, the unsanitized timeFormat value is loaded from storage and inserted into the DOM, causing the injected script to execute.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axigen axigen Mail Server
|
|
| CPEs | cpe:2.3:a:axigen:axigen_mail_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Axigen axigen Mail Server
|
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Fri, 06 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axigen
Axigen mail Server |
|
| Vendors & Products |
Axigen
Axigen mail Server |
Thu, 05 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the timeFormat account preference parameter. Attackers can exploit this by deploying a multi-stage attack. In the first stage, a malicious JavaScript payload is injected into the timeFormat preference by exploiting a separate vulnerability or using compromised credentials. In the second stage, when the victim logs into the WebMail interface, the unsanitized timeFormat value is loaded from storage and inserted into the DOM, causing the injected script to execute. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-02-05T00:00:00.000Z
Updated: 2026-02-09T16:04:27.989Z
Reserved: 2025-12-21T00:00:00.000Z
Link: CVE-2025-68643
Updated: 2026-02-09T16:04:15.136Z
Status : Analyzed
Published: 2026-02-05T17:16:12.597
Modified: 2026-02-10T14:45:36.210
Link: CVE-2025-68643
No data.