Zero-day vulnerability in Active! mail

Stack-based buffer overflow
CVE-2025-42599

Vulnerability details

Advisory: SB2025042335 - Remote code execution in QUALITIA Active! mail

Vulnerable component: Active! mail

CVE-ID: CVE-2025-42599

CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-121 - Stack-based buffer overflow

Description:

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when handling requests. A remote unauthenticated attacker can send a specially crafted request to the server, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability is being actively exploited in the wild.