Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the timeFormat account preference parameter. Attackers can exploit this by deploying a multi-stage attack. In the first stage, a malicious JavaScript payload is injected into the timeFormat preference by exploiting a separate vulnerability or using compromised credentials. In the second stage, when the victim logs into the WebMail interface, the unsanitized timeFormat value is loaded from storage and inserted into the DOM, causing the injected script to execute.
History

Thu, 05 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the timeFormat account preference parameter. Attackers can exploit this by deploying a multi-stage attack. In the first stage, a malicious JavaScript payload is injected into the timeFormat preference by exploiting a separate vulnerability or using compromised credentials. In the second stage, when the victim logs into the WebMail interface, the unsanitized timeFormat value is loaded from storage and inserted into the DOM, causing the injected script to execute.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-05T16:17:55.453Z

Reserved: 2025-12-21T00:00:00.000Z

Link: CVE-2025-68643

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-05T17:16:12.597

Modified: 2026-02-05T17:16:12.597

Link: CVE-2025-68643

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.