CVE-2026-44400
Published: 08 May 2026
Summary
CVE-2026-44400 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Mailenable (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, ranked at the 8.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
NVD Description
MailEnable Enterprise Premium 10.55 and earlier contains an improper authorization vulnerability in the WebAdmin mobile portal that allows attackers to bypass authentication checks by reusing AuthenticationToken cookies generated for low-privileged users. Attackers can obtain a token from the WebMail login…
more
endpoint using the PersistentLogin parameter and replay it against the WebAdmin portal to perform highly privileged administrative actions.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)