CVE-2026-29964
Description
HSC MailInspector v5.3.3-7 contains a Cross-Site Scripting (XSS) vulnerability in the /tap/tap.php endpoint due to improper neutralization of user-controlled input using alternate or obfuscated JavaScript syntax. The endpoint reflects unsanitized user input in HTTP responses without adequate output encoding, allowing a remote attacker to execute arbitrary JavaScript code in the context of a victim's browser.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MailInspector v5.3.3-7 suffers from a reflected XSS in /tap/tap.php via obfuscated JavaScript syntax, enabling session theft and phishing.
Vulnerability
HSC MailInspector v5.3.3-7 contains a Cross-Site Scripting (XSS) vulnerability in the endpoint /tap/tap.php (or /mailinspector/tap/tap.php). The application reflects user-supplied input without proper output encoding and fails to neutralize alternate or obfuscated JavaScript syntax, allowing arbitrary script injection [1][2]. This flaw is classified under CWE-87 (Improper Neutralization of Alternate XSS Syntax).
Exploitation
An attacker can craft a malicious URL containing obfuscated JavaScript payloads and trick a victim into clicking it (user interaction required). No authentication or special network position is needed beyond standard web access [2]. The attacker does not need to be logged in; the XSS is reflected in the HTTP response returned to the victim's browser.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser within the MailInspector application context. This can lead to session token theft, session hijacking, content manipulation, phishing attacks, and potential privilege escalation if an administrator's session is compromised [2]. The CVSS v3.1 score of 8.2 (High) in the reference reflects High confidentiality and integrity impact with a changed scope [2].
Mitigation
As of this disclosure, no official patch or fixed version has been announced by HSC Labs. The vendor advisory page [1] does not mention remediation. Users should monitor the vendor's update channels for a security fix and, in the interim, consider applying a Web Application Firewall (WAF) rule to block reflected XSS patterns in the /tap/tap.php endpoint or limiting access to the MailInspector interface to trusted networks.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 5.3.3-7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/sql3t0/cve-disclosures/blob/main/03_-_CVE-2026-29964_XSS.mdnvdThird Party Advisory
- hsclabs.com/pt-br/mailinspector/nvdProduct
News mentions
0No linked articles in our index yet.