Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via the /api/settings endpoint by providing arbitrary headers. This issue has been patched in version 1.4.10.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bulwarkmail
Bulwarkmail webmail |
|
| Vendors & Products |
Bulwarkmail
Bulwarkmail webmail |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via the /api/settings endpoint by providing arbitrary headers. This issue has been patched in version 1.4.10. | |
| Title | Bulwark Webmail: Authentication Bypass in verifyIdentity() due to missing cookie validation | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T18:11:56.037Z
Reserved: 2026-03-30T20:52:53.284Z
Link: CVE-2026-34834
Updated: 2026-04-02T20:18:17.285Z
Status : Awaiting Analysis
Published: 2026-04-02T20:16:27.983
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-34834
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:16:22Z