| CVE | CVE-2026-44002 | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Title | Template renderer command injection in Orbit Mail maintenance jobs | ||||||||||||||||||||||||||||||||||||
| Case Number | VAPT-2026-04402 | ||||||||||||||||||||||||||||||||||||
| Status | Published | ||||||||||||||||||||||||||||||||||||
| Credits |
| ||||||||||||||||||||||||||||||||||||
| Affected products |
| ||||||||||||||||||||||||||||||||||||
| CVSS |
| ||||||||||||||||||||||||||||||||||||
| References |
| ||||||||||||||||||||||||||||||||||||
| Problem type(s) |
| ||||||||||||||||||||||||||||||||||||
| Date published | Apr 10, 2026 | ||||||||||||||||||||||||||||||||||||
| Last modified | Apr 10, 2026, 13:43 UTC | ||||||||||||||||||||||||||||||||||||
Description
The appliance assembled a shell command by concatenating a renderer binary, template path, and user-controlled directive fields. Escaping was only applied to the template path, so directive values containing shell separators were evaluated by the maintenance job runner.
Known Detection Rules
Upgrade to Orbit Mail Appliance 7.1.6 or later, remove shell invocation from the renderer path, and rotate credentials stored on affected systems. Organizations should inspect maintenance task histories for unapproved directive values.
No authenticated YARA, Sigma, or KQL detection content is attached to this CVE.
References
Public VAPT advisory linked to this CVE.
Public vendor advisory or acknowledgment linked to this CVE.