CVE-2022-41676

TEAM JOHNLONG SOFTWARE CO., LTD. MAILD Mail Server - Cross-Site Scripting

Description

Raiden MAILD Mail Server website mail field has insufficient filtering for user input. A remote attacker with general user privilege can send email using the website with malicious JavaScript in the input field, which triggers XSS (Reflected Cross-Site Scripting) attack to the mail recipient.

Remediation

Solution:

  • Update version to v4.7.4

Categories

5.4
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.05%
Third-Party Advisory org.tw
Affected: TEAM JOHNLONG SOFTWARE CO., LTD. MAILD Mail Server
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-41676?
CVE-2022-41676 has been scored as a medium severity vulnerability.
How to fix CVE-2022-41676?
To fix CVE-2022-41676: Update version to v4.7.4
Is CVE-2022-41676 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-41676 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-41676?
CVE-2022-41676 affects TEAM JOHNLONG SOFTWARE CO., LTD. MAILD Mail Server.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.