CVE-2019-25307

HIGH

WorkgroupMail 7.5.1 - Code Injection

Title source: llm
STIX 2.1

Description

WorkgroupMail 7.5.1 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.

Exploits (1)

exploitdb WRITEUP
by cakes · textlocalwindows
https://www.exploit-db.com/exploits/47523

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 0.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-428
Status published
Products (1)
Softalk/WorkgroupMail 7.5.1
Published Feb 11, 2026
Tracked Since Feb 18, 2026