CVE-2023-26269

HIGH

Apache James <3.7.3 - Privilege Escalation

Title source: llm

Description

Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.

Exploits (1)

nomisec WRITEUP 2 stars
by mbadanoiu · poc
https://github.com/mbadanoiu/CVE-2023-26269

Scores

CVSS v3 7.8
EPSS 0.0116
EPSS Percentile 78.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-862
Status published
Products (2)
apache/james < 3.7.4
org.apache.james/javax-mail-extension 0 - 3.7.4Maven
Published Apr 03, 2023
Tracked Since Feb 18, 2026