VYPR
High severityNVD Advisory· Published May 8, 2026· Updated May 18, 2026

CVE-2026-44129

CVE-2026-44129

Description

SEPPmail Secure Email Gateway before version 15.0.4 contains a server-side template injection vulnerability in the new GINA UI because an endpoint accepts attacker-controlled template, allowing remote attackers to execute arbitrary template expressions and potentially achieve remote code execution depending on the enabled template plugins.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SEPPmail Secure Email Gateway before 15.0.4 is vulnerable to server-side template injection in the GINA UI, allowing remote attackers to execute arbitrary template expressions and potentially achieve RCE.

Vulnerability

Overview

CVE-2026-44129 is a server-side template injection (SSTI) vulnerability in the new GINA UI component of SEPPmail Secure Email Gateway. The root cause is that an endpoint accepts attacker-controlled template input without proper sanitization, enabling the injection of arbitrary template expressions [1]. This flaw exists in versions prior to 15.0.4.

Exploitation

The vulnerable endpoint is accessible over the network, and the GINA UI is a web interface that may be exposed to the internet. While the description does not specify authentication requirements, the SEPPmail gateway typically allows self-registration, making it possible for an attacker to obtain an authenticated session [2]. An attacker can craft a malicious request containing template expressions that are then evaluated by the server-side template engine.

Impact

Successful exploitation allows an attacker to execute arbitrary template expressions. Depending on the enabled template plugins, this can lead to remote code execution (RCE) on the gateway appliance. An attacker could gain full control of the email gateway, potentially compromising all email traffic and stored data.

Mitigation

The vulnerability is fixed in SEPPmail Secure Email Gateway version 15.0.4.3, released on May 11, 2026 [1]. Users are strongly advised to upgrade to this version or later. No workarounds have been published.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

1