MailEnable WebAdmin Vulnerability Bypasses Authentication (CVE-2026-44400)
The National Vulnerability Database highlights CVE-2026-44400, an improper authorization flaw in MailEnable Enterprise Premium 10.55 and earlier. This vulnerability resides in the WebAdmin mobile portal, allowing attackers to bypass authentication. The attack vector involves reusing AuthenticationToken cookies, initially generated for low-privileged users, against the WebAdmin portal.
Attackers can obtain a persistent token from the WebMail login endpoint and then replay it against the WebAdmin portal. This enables the execution of highly privileged administrative actions, effectively granting full control over the MailEnable server. The National Vulnerability Database assigns this a CVSS score of 8.1 (HIGH), underscoring the severity of this authentication bypass.
This isn’t just a theoretical bypass; it’s a critical flaw that grants an attacker administrative access with minimal effort. The attacker’s calculus here is straightforward: compromise a low-privilege WebMail session, grab a cookie, and pivot directly to WebAdmin. Defenders need to recognize that this is a direct path to full system compromise, not just a minor privilege escalation.
What This Means For You
- If your organization uses MailEnable Enterprise Premium 10.55 or earlier, you are directly exposed to CVE-2026-44400. This vulnerability allows an attacker to gain full administrative control over your MailEnable server. Immediately identify all MailEnable instances and apply any available patches or workarounds to mitigate this critical authentication bypass.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-44400 - MailEnable WebAdmin Authentication Bypass via PersistentLogin Token Replay
title: CVE-2026-44400 - MailEnable WebAdmin Authentication Bypass via PersistentLogin Token Replay
id: scw-2026-05-08-ai-1
status: experimental
level: critical
description: |
Detects the initial exploitation attempt of CVE-2026-44400. This rule looks for POST requests to the '/webadmin' URI that include the 'PersistentLogin=true' parameter in the query string, indicating an attempt to generate a token. A successful 200 status code suggests the token was generated, which can then be replayed to bypass authentication.
author: SCW Feed Engine (AI-generated)
date: 2026-05-08
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44400/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/webadmin'
cs-method|exact:
- 'POST'
cs-uri-query|contains:
- 'PersistentLogin=true'
selection_base:
sc-status|exact:
- '200'
condition: selection AND selection_base
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44400 | Auth Bypass | MailEnable Enterprise Premium 10.55 and earlier |
| CVE-2026-44400 | Auth Bypass | Improper authorization in WebAdmin mobile portal |
| CVE-2026-44400 | Auth Bypass | Reusing AuthenticationToken cookies |
| CVE-2026-44400 | Auth Bypass | WebMail login endpoint with PersistentLogin parameter |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 09, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.