Description
Cross-site scripting (XSS) vulnerability in SqWebMail 5.0.4 and possibly other versions allows remote attackers to inject arbitrary web script or HTML via an HTML e-mail containing tags with strings that contain ">" or other special characters, which is not properly sanitized by SqWebMail.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jakob Balle · textwebappsphp
https://www.exploit-db.com/exploits/26200
References (8)
Core 8
Core References
Exploit, Patch third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/16600/
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2005/Aug/975
Exploit x_refsource_misc
http://secunia.com/secunia_research/2005-39/advisory/
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14676
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17156
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22043
Vendor Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-201-1
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112534112715638&w=2
Scores
EPSS
0.1095
EPSS Percentile
93.4%
Details
Status
published
Products (1)
inter7/sqwebmail
5.0.4
Published
Sep 02, 2005
Tracked Since
Feb 18, 2026