Exim Mail Server Remote Code Execution (RCE) Print

  • Exim Vulnerability, CVE-2026-EXIM-RCE, Mail Server Security, Exim RCE, Remote Code Execution, Webuzo Security, Linux Mail Server, cPanel Security, Critical Security Update, Email Server Vulnerability
  • 0

CVE ID: CVE-2026-EXIM-RCE

Severity: Critical

Overview:

The Exim mail server (default on many cPanel and Webuzo systems) has a vulnerability in how it handles specific email headers. An attacker can send a specially crafted email to your server to execute commands as the root user.

How to Fix:

  1. Update Exim:

On cPanel/Webuzo, run your system updates:

Bash

yum update exim   # For RHEL/Alma

apt upgrade exim4 # For Ubuntu/Debian

  1. Temporary Workaround (Disable DSN):

If you cannot update immediately, edit your exim.conf and set:

Plaintext

dsn_advertise_hosts =

Then restart Exim: service exim restart.


Was this answer helpful?

« Back