AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions in the BIN directory to replace the service executable and gain elevated system access.
History

Fri, 19 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions in the BIN directory to replace the service executable and gain elevated system access.
Title AspEmail 5.6.0.2 Local Privilege Escalation via Binary Permission Vulnerability
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-19T21:52:30.727Z

Reserved: 2025-12-16T19:22:09.998Z

Link: CVE-2023-53949

cve-icon Vulnrichment

Updated: 2025-12-19T21:52:17.072Z

cve-icon NVD

Status : Received

Published: 2025-12-19T21:15:50.397

Modified: 2025-12-19T21:15:50.397

Link: CVE-2023-53949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.