CVE-2026-25602
Description
Insufficient Verification of Data Authenticity vulnerability in Mesalvo Meona Client Launcher Component, Mesalvo Meona Server Component makes it possible to send messages to any email address. This issue affects Meona Client Launcher Component: through 19.06.2020 15:11:49; Meona Server Component: through 2025.04 5+323020.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Mesalvo Meona components allow unvalidated message sending to any email, enabling email spoofing with only user-level credentials.
Vulnerability
The Meona Client Launcher Component (version 19.06.2020 15:11:49) and Meona Server Component (through version 2025.04 5+323020) lack proper verification of data authenticity. The backend server does not validate permissions of the supplied credentials, allowing a regular (non-admin) authenticated user to abuse the message sending functionality to send emails to arbitrary recipients without restriction [1].
Exploitation
An attacker with valid but non-privileged user credentials can directly access the message sending feature. Because the server fails to verify user permissions, the attacker can craft messages and submit them via the client-launcher interface, targeting any email address [1]. The attacker does not need admin access or any special network position beyond being an authenticated user of the Meona system.
Impact
Successful exploitation enables email spoofing — the attacker can send messages that appear to originate from the legitimate Meona system to any external email address. This could be leveraged for phishing attacks against patients, staff, or other parties, undermining trust in communications from the healthcare application [1].
Mitigation
As of the publication date (2026-05-20), no fixed version has been released; the vulnerabilities were disclosed during a coordinated disclosure process supported by the Austrian CERT [1]. Users should monitor vendor advisories for patches. A workaround is not described in the available references [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <= 19.06.2020 15:11:49
- Range: <= 2025.04 5+323020
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.