An issue was discovered in TitanHQ SpamTitan Email Security Gateway 8.00.x before 8.00.101 and 8.01.x before 8.01.14. The file quarantine.php within the SpamTitan interface allows unauthenticated users to trigger account-level actions using a crafted GET request. Notably, when a non-existent email address is provided as part of the email parameter, SpamTitan will automatically create a user record and associate quarantine settings with it - all without requiring authentication.
History

Thu, 21 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-306
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 16:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in TitanHQ SpamTitan Email Security Gateway 8.00.x before 8.00.101 and 8.01.x before 8.01.14. The file quarantine.php within the SpamTitan interface allows unauthenticated users to trigger account-level actions using a crafted GET request. Notably, when a non-existent email address is provided as part of the email parameter, SpamTitan will automatically create a user record and associate quarantine settings with it - all without requiring authentication.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-21T00:00:00.000Z

Updated: 2025-08-21T17:55:52.425Z

Reserved: 2024-08-29T00:00:00.000Z

Link: CVE-2024-45438

cve-icon Vulnrichment

Updated: 2025-08-21T17:54:28.203Z

cve-icon NVD

Status : Received

Published: 2025-08-21T17:15:29.553

Modified: 2025-08-21T18:15:33.507

Link: CVE-2024-45438

cve-icon Redhat

No data.