CVE-2025-40631

HTTP host header injection vulnerability in IceWarp Mail Server

Description

HTTP host header injection vulnerability in Icewarp Mail Server affecting version 11.4.0. By modifying the Host header and adding a payload, arbitrary JavaScript code can be executed on page load. The user must interact with a malicious link to be redirected.

Remediation

Solution:

  • The vulnerabilities have been fixed by the IceWarp team in the 13.0.2 version.

Category

2.0
CVSS
Severity: Low
CVSS 4.0 •
EPSS 0.02%
Affected: Icewarp Icewarp Mail Server
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-40631?
CVE-2025-40631 has been scored as a low severity vulnerability.
How to fix CVE-2025-40631?
To fix CVE-2025-40631: The vulnerabilities have been fixed by the IceWarp team in the 13.0.2 version.
Is CVE-2025-40631 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-40631 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-40631?
CVE-2025-40631 affects Icewarp Icewarp Mail Server.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.