{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22239","assignerOrgId":"56a186b1-7f5e-4314-ba38-38d5499fccfd","state":"PUBLISHED","assignerShortName":"MHV","dateReserved":"2026-01-06T23:20:59.365Z","datePublished":"2026-01-14T14:40:20.516Z","dateUpdated":"2026-01-14T14:56:01.047Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"BLUVOYIX","vendor":"Bluspark Global","versions":[{"status":"affected","version":"0"}]}],"credits":[{"lang":"en","type":"finder","value":"The vulnerability was discovered by Eaton Zveare."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The vulnerability exists in BLUVOYIX due to design flaws in the email sending API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable email sending API. Successful exploitation of this vulnerability could allow the attacker to send unsolicited emails to anyone on behalf of the company.<br>"}],"value":"The vulnerability exists in BLUVOYIX due to design flaws in the email sending API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable email sending API. Successful exploitation of this vulnerability could allow the attacker to send unsolicited emails to anyone on behalf of the company."}],"impacts":[{"capecId":"CAPEC-98","descriptions":[{"lang":"en","value":"CAPEC-98 Phishing"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":10,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"AMBER","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/RE:H/U:Amber","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"HIGH"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"56a186b1-7f5e-4314-ba38-38d5499fccfd","shortName":"MHV","dateUpdated":"2026-01-14T14:40:20.516Z"},"references":[{"url":"https://blusparkglobal.com/bluvoyix/"}],"source":{"discovery":"UNKNOWN"},"title":"Email Sending Vulnerability in BLUVOYIX","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-14T14:55:32.045518Z","id":"CVE-2026-22239","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-14T14:56:01.047Z"}}]}}