VYPR
Medium severityNVD Advisory· Published Oct 31, 2025· Updated Apr 15, 2026

CVE-2025-12460

CVE-2025-12460

Description

An XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img HTML tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window, and access user data.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An XSS vulnerability in Afterlogic Aurora webmail ≤9.8.3 allows attackers to execute arbitrary JavaScript via a crafted HTML email with JavaScript in an img tag.

Vulnerability

CVE-2025-12460 is a stored Cross-Site Scripting (XSS) vulnerability affecting Afterlogic Aurora webmail version 9.8.3 and earlier. The root cause lies in insufficient sanitization of HTML email content, specifically within the MailSo/Base/HtmlUtils.php file. An attacker can craft an email containing a malicious `` tag with inline JavaScript, which is not properly filtered when the email is rendered in the browser [1].

Exploitation

To exploit this vulnerability, an attacker sends a specially crafted HTML email to a victim. No authentication is required from the attacker beyond having the ability to send email to the target user. The victim only needs to view the email in the Aurora webmail interface. The malicious JavaScript embedded in the `` tag executes in the context of the victim's browser session [1].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript within the security context of the webmail application. This can lead to theft of session cookies, exfiltration of email content, unauthorized actions performed on behalf of the victim, or other client-side attacks that a typical XSS enables. The vulnerability does not provide direct server-side access but compromises the user's browser session [1].

Mitigation

The vendor confirmed a fix was verified and issued a patch. Users can either wait for the next official release or apply the patch manually. The patch introduces a new SanitizeComments() function in the HtmlUtils.php file and improves sanitization of HTML comments and attributes. A hotfix is also available by replacing the affected file with a patched version [1]. No known exploitation in the wild was reported at the time of advisory. There is no indication the CVE is on the KEV list.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.