Description
When using the attachment interaction functionality, Canary Mail 5.1.40 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software.
Exploits (1)
nomisec
WORKING POC
7 stars
by bbaboha · poc
https://github.com/bbaboha/CVE-2025-65318-and-CVE-2025-65319
References (5)
Core 5
Core References
Broken Link
http://canary.com
Broken Link
http://canarymail.com
Exploit, Third Party Advisory
https://github.com/bbaboha/CVE-2025-65318-and-CVE-2025-65319
Not Applicable
https://github.com/nickvourd/RTI-Toolkit
Scores
CVSS v3
9.1
EPSS
0.0013
EPSS Percentile
32.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-693
Status
published
Products (1)
canarymail/canary_mail
< 5.1.40
Published
Dec 16, 2025
Tracked Since
Feb 18, 2026