[Japanese]
|
JVNDB-2025-000045
|
Multiple vulnerabilities in Active! mail
|
Active! mail provided by QUALITIA CO., LTD. contains multiple vulnerabilities listed below.
- Cross-site scripting (CWE-79) - CVE-2025-52462
- Cross-site request forgery (CSRF) (CWE-352) - CVE-2025-52463
Rintaro Fujita and Shoji Baba of GAKUSHUIN UNIVERSITY reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 6.1 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2025-52462
|
CVSS V3 Severity:
Base Metrics:4.3 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
The above CVSS base scores have been assigned for CVE-2025-52463
|
|
QUALITIA CO., LTD.
- Active! mail 6 BuildInfo 6.30.01004145 to 6.60.06008562 (CVE-2025-52462)
- Active! mail 6 BuildInfo 6.60.06008562 and earlier (CVE-2025-52463)
|
|
- An arbitrary script may be executed on the logged-in user's web browser when accessing a specially crafted URL (CVE-2025-52462)
- Unintended E-mail may be sent if a user accesses a specially crafted URL while logged in (CVE-2025-52463)
|
[Update the Software]
Update the software to the latest version according to the information provided by the developer.
The developer has released the following version that address these vulnerabilities.
- Active! mail 6 BuildInfo: 6.61.01008654
|
QUALITIA CO., LTD.
|
- Cross-Site Request Forgery(CWE-352) [IPA Evaluation]
- Cross-site Scripting(CWE-79) [IPA Evaluation]
|
- CVE-2025-52462
- CVE-2025-52463
|
- JVN : JVN#89505333
|
- [2025/07/02]
Web page was published
|