๐Ÿ” CVE Alert

CVE-2026-34834

UNKNOWN 0.0

Bulwark Webmail: Authentication Bypass in verifyIdentity() due to missing cookie validation

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
22th

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via the /api/settings endpoint by providing arbitrary headers. This issue has been patched in version 1.4.10.

CWE CWE-287
Vendor bulwarkmail
Product webmail
Published Apr 2, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for bulwarkmail webmail

Be the first to know when new unknown vulnerabilities affecting bulwarkmail webmail are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

bulwarkmail / webmail
< 1.4.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/bulwarkmail/webmail/security/advisories/GHSA-4356-876g-rfmh github.com: https://github.com/bulwarkmail/webmail/releases/tag/1.4.10