SECURITY_TEMPLATE.md
CVE ID: CVE-YYYY-NNNNN
Publication Date: YYYY-MM-DD
Last Updated: YYYY-MM-DD
[Provide a brief, non-technical summary of the vulnerability in 1-2 sentences]
Product: Stalwart Mail and Collaboration Server
Affected Versions:
Fixed Versions:
[Detailed technical description of the vulnerability, including how it can be exploited]
[Describe the potential impact if this vulnerability is exploited]
CVSS v3.1 Base Score: X.X ([SEVERITY])
Vector String: CVSS:3.1/AV:X/AC:X/PR:X/UI:X/S:X/C:X/I:X/A:X
Severity Breakdown:
CWE-XXX: [Weakness Name]
[Explain the underlying cause of the vulnerability]
[Describe a realistic attack scenario or proof of concept, without providing exploit code]
[List any conditions that must be met for successful exploitation]
# Example upgrade commands
[Provide specific upgrade instructions for Stalwart]
[If applicable, describe any temporary workarounds for systems that cannot be immediately upgraded]
Note: Workarounds are temporary measures and do not fully resolve the vulnerability. Upgrading is strongly recommended.
[List any logs, patterns, or indicators that may suggest exploitation attempts]
[Example log entries that administrators should look for]
This vulnerability was discovered by [Researcher Name / Organization].
For questions or concerns regarding this advisory, please contact:
Security Team: [email protected]
Website: https://stalw.art
To report security vulnerabilities in Stalwart, please follow our responsible disclosure policy.
This advisory is provided "as is" without warranty of any kind. The information contained in this advisory is subject to change without notice.
Document Version: 1.0
Classification: Public