Vulnerability Description
Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qualitia | Active\! Mail | < 6.60.05008562 |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/jp/JVN22348866/Third Party Advisory
- https://www.qualitia.com/jp/news/2025/04/18_1030.htmlVendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-US Government Resource
FAQ
What is CVE-2025-42599?
CVE-2025-42599 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker ma...
How severe is CVE-2025-42599?
CVE-2025-42599 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-42599?
Check the references section above for vendor advisories and patch information. Affected products include: Qualitia Active\! Mail.