Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation

Posted on May 20, 2025May 20, 2025 By CWS

CISA has lately expanded its Recognized Exploited Vulnerabilities (KEV) Catalog to incorporate a big safety flaw affecting the MDaemon E mail Server, tracked as CVE-2024-11182. 

This vulnerability, categorized beneath CWE-79 (Improper Neutralization of Enter Throughout Net Web page Technology, generally often called Cross-Website Scripting or XSS), permits distant attackers to execute arbitrary JavaScript code within the context of a consumer’s browser through a specifically crafted HTML e-mail. 

The addition of this vulnerability to the KEV Catalog underscores its energetic exploitation threat and the pressing want for organizations to use mitigations or discontinue use if patches are unavailable. 

As federal companies and enterprises alike depend on the KEV Catalog for vulnerability prioritization, the inclusion of CVE-2024-11182 highlights the evolving risk panorama dealing with e-mail infrastructure at the moment.

Understanding CVE-2024-11182 and XSS in MDaemon

CVE-2024-11182 is a cross-site scripting (XSS) vulnerability recognized in MDaemon E mail Server variations previous to 24.5.1c. 

The flaw arises from inadequate sanitization of HTML content material in e-mail messages processed by the server’s webmail interface. Particularly, attackers can embed malicious JavaScript inside the img tag of an HTML e-mail. 

When a consumer accesses the malicious e-mail by way of the webmail shopper, the injected script executes inside the browser, inheriting the privileges and session of the sufferer consumer. 

This kind of vulnerability falls beneath CWE-79, a well known class of safety points the place user-supplied enter shouldn’t be correctly neutralized earlier than being included in net web page output.

The technical mechanism of this assault leverages the browser’s dealing with of HTML and JavaScript, exploiting the belief relationship between the webmail utility and the consumer’s browser session. 

By injecting JavaScript, an attacker can carry out actions equivalent to stealing session cookies, redirecting customers to malicious websites, or performing actions on behalf of the consumer with out their consent. 

The inclusion of CVE-2024-11182 within the CISA KEV Catalog is a direct response to proof of energetic exploitation within the wild. 

The KEV Catalog, maintained by CISA, serves as an authoritative repository of vulnerabilities which have been exploited in opposition to private and non-private organizations. 

Its objective is to information federal companies and, by extension, the broader cybersecurity neighborhood in prioritizing the remediation of high-risk vulnerabilities.

Danger FactorsDetailsAffected ProductsMDaemon E mail Server <24.5.1c ImpactArbitrary JavaScript execution through webmail interface, enabling session hijacking, credential theft, or unauthorized actionsExploit Prerequisites1. Attacker sends crafted HTML e-mail 2. Sufferer views e-mail through a webmail clientCVSS 3.1 Score6.1 (Medium)

Mitigation

In response to the disclosure of CVE-2024-11182, MDaemon Applied sciences has launched an replace addressing the XSS vulnerability in variations 24.5.1c and later. 

Organizations operating affected variations are strongly suggested to use the vendor-provided patch instantly to mitigate the danger of exploitation. 

If patching shouldn’t be possible, CISA recommends following mitigation steering, together with disabling weak providers or discontinuing use of the product till a repair is on the market.

Moreover, safety groups are inspired to assessment and improve e-mail filtering and sanitization mechanisms, conduct common vulnerability scans, and educate customers concerning the dangers of interacting with suspicious emails.

For environments the place patching is delayed, implementing net utility firewalls (WAFs) or e-mail safety gateways able to filtering malicious HTML and JavaScript content material can present an interim layer of protection.

Equip your SOC crew with deep risk evaluation for sooner response -> Get Additional Sandbox Licenses for Free

Cyber Security News Tags:Adds, Catalog, CISA, Email, Exploitation, KEV, MDaemon, Server, Vulnerability, XSS

Post navigation

Previous Post: NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch
Next Post: VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands

Related Posts

Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
New Weaponized PyPI Package Attacking Developers to Steal Source Code Cyber Security News
F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands Cyber Security News
Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Cyber Security News
UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
  • CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
  • NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
  • CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
  • NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News