CVE-2026-34834 PUBLISHED

Bulwark Webmail: Authentication Bypass in verifyIdentity() due to missing cookie validation

Assigner: GitHub_M
Reserved: 30.03.2026 Published: 02.04.2026 Updated: 02.04.2026

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via the /api/settings endpoint by providing arbitrary headers. This issue has been patched in version 1.4.10.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor bulwarkmail
Product webmail
Versions
  • Version < 1.4.10 is affected

References

Problem Types

  • CWE-287: Improper Authentication CWE