An XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img HTML tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window, and access user data.
PUBLISHED5.2CWE-79
Stored XSS vulnerability in Afterlogic Aurora webmail
Problem type
Affected products
Afterlogic
Aurora
<= 9.8.3 - AFFECTED
References
GitHub Security Advisories
GHSA-vc68-c4h2-5g4j
An XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can...
https://github.com/advisories/GHSA-vc68-c4h2-5g4jAn XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img HTML tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window, and access user data.
JSON source
Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-12460",
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"dateUpdated": "2025-10-31T14:09:59.967Z",
"dateReserved": "2025-10-29T08:21:40.965Z",
"datePublished": "2025-10-31T13:53:58.574Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET",
"dateUpdated": "2025-10-31T13:53:58.574Z"
},
"title": "Stored XSS vulnerability in Afterlogic Aurora webmail",
"descriptions": [
{
"lang": "en",
"value": "An XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img HTML tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window, and access user data.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "An XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img HTML tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window, and access user data."
}
]
}
],
"affected": [
{
"vendor": "Afterlogic",
"product": "Aurora",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "9.8.3"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')",
"cweId": "CWE-79",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://auroramail.wordpress.com/2025/10/28/xss-vulnerability-in-afterlogic-webmail-and-aurora-corporate/"
}
],
"impacts": [
{
"capecId": "CAPEC-592",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-592 Stored XSS"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"exploits": [
{
"lang": "en",
"value": "Actively exploited in the wild.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Actively exploited in the wild.<br>"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Matthieu Faou (ESET)",
"type": "finder"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-10-31T14:09:59.967Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}