CVE-2026-25602 describes an insufficient verification of data authenticity issue in Mesalvo Meona Client Launcher Component and Mesalvo Meona Server Component. According to the CVE record, the flaw may make it possible to send messages to any email address. The published CVSS v3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) suggests a low-complexity issue requiring local access and low privileges, with l [truncated]
CVE-2026-22315 describes an incorrect privilege assignment issue in the Meona Client Launcher Component and Meona Server Component that can allow export of user data, including cleartext passwords, via the SQL editor. The supplied NVD record rates the issue HIGH with CVSS 3.1 vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating remote reachability but requiring high privileges. The affected ranges in th [truncated]
CVE-2026-22314 is a critical code injection vulnerability affecting Mesalvo Meona Client Launcher Component and Mesalvo Meona Server Component. According to the NVD record, exploitation could lead to code execution on other users' systems, and the record lists CVSS v3.1 AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H. NVD currently marks the vulnerability status as Deferred, and the only referenced source in the supp [truncated]