CVE-2026-34834
Bulwark Webmail: Authentication Bypass in verifyIdentity() due to missing cookie validation
CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
22th
Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via the /api/settings endpoint by providing arbitrary headers. This issue has been patched in version 1.4.10.
| CWE | CWE-287 |
| Vendor | bulwarkmail |
| Product | webmail |
| Published | Apr 2, 2026 |
| Last Updated | Apr 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for bulwarkmail webmail
Be the first to know when new unknown vulnerabilities affecting bulwarkmail webmail are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
bulwarkmail / webmail
< 1.4.10