CVE-2025-56425
Published: 08 January 2026
Description
An issue was discovered in the AppConnector component version 10.10.0.183 and earlier of enaio 10.10, in the AppConnector component version 11.0.0.183 and earlier of enaio 11.0, and in the AppConnctor component version 11.10.0.183 and earlier of enaio 11.10. The vulnerability…
more
allows authenticated remote attackers to inject arbitrary SMTP commands via crafted input to the /osrest/api/organization/sendmail endpoint
Mitigating Controls (NIST 800-53 r5)AI
Directly requires input validation at the /osrest/api/organization/sendmail endpoint to prevent injection of arbitrary SMTP commands.
Enforces restrictions on inputs to the vulnerable API endpoint, blocking crafted payloads that enable SMTP command injection.
Mandates timely flaw remediation, including patching the command injection vulnerability in affected AppConnector versions.
Security SummaryAI
CVE-2025-56425 is a command injection vulnerability (CWE-77) discovered in the AppConnector component of enaio software. It affects AppConnector version 10.10.0.183 and earlier in enaio 10.10, version 11.0.0.183 and earlier in enaio 11.0, and version 11.10.0.183 and earlier in enaio 11.10. The flaw enables authenticated remote attackers to inject arbitrary SMTP commands by supplying crafted input to the /osrest/api/organization/sendmail endpoint. Published on 2026-01-08, it carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).
Authenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction. By sending malicious payloads to the specified endpoint, they can inject and execute arbitrary SMTP commands, potentially compromising confidentiality and availability to a high degree as indicated by the CVSS metrics.
Advisories and mitigation details are available in references including the analysis at https://mind-bytes.de/smtp-injection-in-enaio-component-appconnector-cve-2025-56425/ and the vendor site at https://www.optimal-systems.de/enaio. Security practitioners should consult these for patching instructions and workarounds specific to affected enaio deployments.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a command injection in a public-facing REST API endpoint (/osrest/api/organization/sendmail) exploitable remotely over the network (AV:N/AC:L/PR:N), directly enabling T1190: Exploit Public-Facing Application.