๐Ÿ” CVE Alert

CVE-2026-35390

MEDIUM 6.1

Content-Security-Policy was set to Report-Only mode, failing to block XSS attacks

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
14th

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reverse proxy (proxy.ts) set the Content-Security-Policy-Report-Only header instead of the enforcing Content-Security-Policy header. This means cross-site scripting (XSS) attacks were logged but not blocked. Any user who could inject script content (e.g., via crafted email HTML) could execute arbitrary JavaScript in the context of the application, potentially stealing session tokens or performing actions on behalf of the user. This vulnerability is fixed in 1.4.11.

CWE CWE-79
Vendor bulwarkmail
Product webmail
Published Apr 6, 2026
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for bulwarkmail webmail

Be the first to know when new medium vulnerabilities affecting bulwarkmail webmail are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

bulwarkmail / webmail
< 1.4.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/bulwarkmail/webmail/security/advisories/GHSA-6q52-98cr-qx65