Browse all 5 CVE security advisories affecting axllent. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Axllent develops software components primarily used in web applications and enterprise systems. Historically, the organization's products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities. Security researchers have identified multiple authentication bypass flaws and insecure direct object references in their offerings. While no major public security incidents have been widely documented, the five CVEs recorded to date highlight recurring input validation weaknesses. The company's codebase has shown patterns of insufficient sanitization of user-supplied data and inadequate access controls in administrative interfaces, requiring consistent remediation efforts to maintain secure deployment environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-27808 | Mailpit is Vulnerable to Server-Side Request Forgery (SSRF) via Link Check API — mailpitCWE-918 | 5.8 | Medium | 2026-02-25 |
| CVE-2026-23845 | Mailpit Vulnerable to Server-Side Request Forgery (SSRF) via HTML Check API — mailpitCWE-918 | 5.8 | Medium | 2026-01-19 |
| CVE-2026-23829 | Mailpit has SMTP Header Injection via Regex Bypass — mailpitCWE-93 | 5.3 | Medium | 2026-01-18 |
| CVE-2026-22689 | Mailpit is vulnerable to Cross-Site WebSocket Hijacking (CSWSH) allowing unauthenticated access to emails — mailpitCWE-1385 | 6.5 | Medium | 2026-01-10 |
| CVE-2026-21859 | Mailpit Proxy Endpoint is Vulnerable to Server-Side Request Forgery (SSRF) — mailpitCWE-918 | 5.8 | Medium | 2026-01-07 |
This page lists every published CVE security advisory associated with axllent. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.