HSC MailInspector 5.3.3-7 has a Path Traversal vulnerability due to improper validation of user-supplied input in the /tap/dw.php endpoint. The text parameter is used to construct file paths without adequate normalization or restriction to a safe base directory. A remote attacker can exploit this flaw to access arbitrary files on the underlying operating system, resulting in unauthorized disclosure of sensitive information.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 18 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hsclabs
Hsclabs mailinspector |
|
| Vendors & Products |
Hsclabs
Hsclabs mailinspector |
Mon, 18 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal Allowing Arbitrary File Disclosure in HSC MailInspector 5.3.3-7 | |
| Weaknesses | CWE-20 CWE-22 |
Mon, 18 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HSC MailInspector 5.3.3-7 has a Path Traversal vulnerability due to improper validation of user-supplied input in the /tap/dw.php endpoint. The text parameter is used to construct file paths without adequate normalization or restriction to a safe base directory. A remote attacker can exploit this flaw to access arbitrary files on the underlying operating system, resulting in unauthorized disclosure of sensitive information. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-18T17:07:22.444Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29963
No data.
Status : Undergoing Analysis
Published: 2026-05-18T18:17:21.517
Modified: 2026-05-18T19:37:49.260
Link: CVE-2026-29963
No data.
OpenCVE Enrichment
Updated: 2026-05-18T20:00:12Z