proofpoint CVE Vulnerabilities & Metrics

Focus on proofpoint vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About proofpoint Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with proofpoint. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total proofpoint CVEs: 35
Earliest CVE date: 31 Dec 2004, 05:00 UTC
Latest CVE date: 09 Jan 2024, 22:15 UTC

Latest CVE reference: CVE-2023-5770

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical proofpoint CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.72

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 18
4.0-6.9 13
7.0-8.9 9
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS proofpoint CVEs

These are the five CVEs with the highest CVSS scores for proofpoint, sorted by severity first and recency.

All CVEs for proofpoint

CVE-2023-5770 proofpoint vulnerability CVSS: 0 09 Jan 2024, 22:15 UTC

Proofpoint Enterprise Protection contains a vulnerability in the email delivery agent that allows an unauthenticated attacker to inject improperly encoded HTML into the email body of a message through the email subject. The vulnerability is caused by inappropriate encoding when rewriting the email before delivery.This issue affects Proofpoint Enterprise Protection: from 8.20.2 before patch 4809, from 8.20.0 before patch 4805, from 8.18.6 before patch 4804 and all other prior versions.

CVE-2023-5771 proofpoint vulnerability CVSS: 0 06 Nov 2023, 21:15 UTC

Proofpoint Enterprise Protection contains a stored XSS vulnerability in the AdminUI. An unauthenticated attacker can send a specially crafted email with HTML in the subject which triggers XSS when viewing quarantined messages.  This issue affects Proofpoint Enterprise Protection: from 8.20.0 before patch 4796, from 8.18.6 before patch 4795 and all other prior versions.

CVE-2023-4828 proofpoint vulnerability CVSS: 0 13 Sep 2023, 16:15 UTC

An improper check for an exceptional condition in the Insider Threat Management (ITM) Server could be used by an attacker to change the server's configuration of any already-registered agent so that the agent sends all future communications to an attacker-chosen URL. This could result in disclosure of sensitive data events from the agent about the personally identifiable information (PII) and intellectual property it monitors, and all such data could be altered or deleted before reaching the ITM Server. An attacker must first successfully obtain valid agent credentials and agent hostname. All versions prior to 7.14.3.69 are affected.

CVE-2023-4803 proofpoint vulnerability CVSS: 0 13 Sep 2023, 16:15 UTC

A reflected cross-site scripting vulnerability in the WriteWindowTitle endpoint of the Insider Threat Management (ITM) Server's web console could be used by an authenticated administrator to run arbitrary javascript within another web console administrator's browser. All versions prior to 7.14.3.69 are affected.

CVE-2023-4802 proofpoint vulnerability CVSS: 0 13 Sep 2023, 16:15 UTC

A reflected cross-site scripting vulnerability in the UpdateInstalledSoftware endpoint of the Insider Threat Management (ITM) Server's web console could be used by an authenticated administrator to run arbitrary javascript within another web console administrator's browser. All versions prior to 7.14.3.69 are affected.

CVE-2023-4801 proofpoint vulnerability CVSS: 0 13 Sep 2023, 16:15 UTC

An improper certification validation vulnerability in the Insider Threat Management (ITM) Agent for MacOS could be used by an anonymous actor on an adjacent network to establish a man-in-the-middle position between the agent and the ITM server after the agent has registered. All versions prior to 7.14.3.69 are affected. Agents for Windows, Linux, and Cloud are unaffected.

CVE-2023-36002 proofpoint vulnerability CVSS: 0 27 Jun 2023, 15:15 UTC

A missing authorization check in multiple URL validation endpoints of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to smuggle content via DNS lookups. All versions before 7.14.3 are affected.

CVE-2023-36000 proofpoint vulnerability CVSS: 0 27 Jun 2023, 15:15 UTC

A missing authorization check in the MacOS agent configuration endpoint of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to obtain sensitive information. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected.

CVE-2023-35998 proofpoint vulnerability CVSS: 0 27 Jun 2023, 15:15 UTC

A missing authorization check in multiple SOAP endpoints of the Insider Threat Management Server enables an attacker on an adjacent network to read and write unauthorized objects. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected.

CVE-2023-2818 proofpoint vulnerability CVSS: 0 27 Jun 2023, 15:15 UTC

An insecure filesystem permission in the Insider Threat Management Agent for Windows enables local unprivileged users to disrupt agent monitoring. All versions prior to 7.14.3 are affected. Agents for MacOS and Linux and Cloud are unaffected.

CVE-2023-2820 proofpoint vulnerability CVSS: 0 14 Jun 2023, 22:15 UTC

An information disclosure vulnerability in the faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected. 

CVE-2023-2819 proofpoint vulnerability CVSS: 0 14 Jun 2023, 22:15 UTC

A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type.  This could result in arbitrary javascript code execution in an admin context. All versions prior to 5.10.0 are affected.  

CVE-2023-0090 proofpoint vulnerability CVSS: 0 08 Mar 2023, 01:15 UTC

The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection'. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below.

CVE-2023-0089 proofpoint vulnerability CVSS: 0 08 Mar 2023, 01:15 UTC

The webutils in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows an authenticated user to execute remote code through 'eval injection'. This affects all versions 8.20.0 and below.

CVE-2022-46334 proofpoint vulnerability CVSS: 0 21 Dec 2022, 21:15 UTC

Proofpoint Enterprise Protection (PPS/PoD) contains a vulnerability which allows the pps user to escalate to root privileges due to unnecessary permissions. This affects all versions 8.19.0 and below.

CVE-2022-46333 proofpoint vulnerability CVSS: 0 06 Dec 2022, 20:15 UTC

The admin user interface in Proofpoint Enterprise Protection (PPS/PoD) contains a command injection vulnerability that enables an admin to execute commands beyond their allowed scope. This affects all versions 8.19.0 and below.

CVE-2022-46332 proofpoint vulnerability CVSS: 0 06 Dec 2022, 20:15 UTC

The Admin Smart Search feature in Proofpoint Enterprise Protection (PPS/PoD) contains a stored cross-site scripting vulnerability that enables an anonymous email sender to gain admin privileges within the user interface. This affects all versions 8.19.0 and below.

CVE-2021-31608 proofpoint vulnerability CVSS: 0 17 Nov 2022, 22:15 UTC

Proofpoint Enterprise Protection before 18.8.0 allows a Bypass of a Security Control.

CVE-2022-25294 proofpoint vulnerability CVSS: 7.2 10 Mar 2022, 17:47 UTC

Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal.

CVE-2021-40843 proofpoint vulnerability CVSS: 6.9 13 Oct 2021, 18:15 UTC

Proofpoint Insider Threat Management Server contains an unsafe deserialization vulnerability in the Web Console. An attacker with write access to the local database could cause arbitrary code to execute with SYSTEM privileges on the underlying server when a Web Console user triggers retrieval of that data. When chained with a SQL injection vulnerability, the vulnerability could be exploited remotely if Web Console users click a series of maliciously crafted URLs. All versions prior to 7.11.2 are affected.

CVE-2021-40842 proofpoint vulnerability CVSS: 7.5 13 Oct 2021, 18:15 UTC

Proofpoint Insider Threat Management Server contains a SQL injection vulnerability in the Web Console. The vulnerability exists due to improper input validation on the database name parameter required in certain unauthenticated APIs. A malicious URL visited by anyone with network access to the server could be used to blindly execute arbitrary SQL statements on the backend database. Version 7.12.0 and all versions prior to 7.11.2 are affected.

CVE-2021-39304 proofpoint vulnerability CVSS: 5.0 13 Oct 2021, 15:15 UTC

Proofpoint Enterprise Protection before 8.12.0-2108090000 allows security control bypass.

CVE-2020-14009 proofpoint vulnerability CVSS: 6.8 07 May 2021, 12:15 UTC

Proofpoint Enterprise Protection (PPS/PoD) before 8.16.4 contains a vulnerability that could allow an attacker to deliver an email message with a malicious attachment that bypasses scanning and file-blocking rules. The vulnerability exists because messages with certain crafted and malformed multipart structures are not properly handled.

CVE-2021-27900 proofpoint vulnerability CVSS: 5.5 06 Apr 2021, 22:15 UTC

The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is missing an authorization check on several pages in the Web Console. This enables a view-only user to change any configuration setting and delete any registered agents. All versions before 7.11.1 are affected.

CVE-2021-27899 proofpoint vulnerability CVSS: 5.8 06 Apr 2021, 21:15 UTC

The Proofpoint Insider Threat Management Agents (formerly ObserveIT Agent) for MacOS and Linux perform improper validation of the ITM Server's certificate, which enables a remote attacker to intercept and alter these communications using a man-in-the-middle attack. All versions before 7.11.1 are affected. Agents for Windows and Cloud are not affected.

CVE-2021-22158 proofpoint vulnerability CVSS: 6.5 06 Apr 2021, 21:15 UTC

The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is vulnerable to XML external entity (XXE) injection in the Web Console. The vulnerability requires admin user privileges and knowledge of the XML file's encryption key to successfully exploit. All versions before 7.11 are affected.

CVE-2021-22157 proofpoint vulnerability CVSS: 4.3 06 Apr 2021, 21:15 UTC

Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.11.1 allows stored XSS.

CVE-2021-22159 proofpoint vulnerability CVSS: 7.2 26 Jan 2021, 20:15 UTC

Insider Threat Management Windows Agent Local Privilege Escalation Vulnerability The Proofpoint Insider Threat Management (formerly ObserveIT) Agent for Windows before 7.4.3, 7.5.4, 7.6.5, 7.7.5, 7.8.4, 7.9.3, 7.10.2, and 7.11.0.25 as well as versions 7.3 and earlier is missing authentication for a critical function, which allows a local authenticated Windows user to run arbitrary commands with the privileges of the Windows SYSTEM user. Agents for MacOS, Linux, and ITM Cloud are not affected.

CVE-2020-8884 proofpoint vulnerability CVSS: 9.0 06 Jan 2021, 14:15 UTC

rcdsvc in the Proofpoint Insider Threat Management Windows Agent (formerly ObserveIT Windows Agent) before 7.9 allows remote authenticated users to execute arbitrary code as SYSTEM because of improper deserialization over named pipes.

CVE-2020-10658 proofpoint vulnerability CVSS: 7.5 06 Jan 2021, 14:15 UTC

The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM application server's WriteImage API. The vulnerability allows an anonymous remote attacker to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization.

CVE-2020-10657 proofpoint vulnerability CVSS: 6.5 06 Jan 2021, 14:15 UTC

The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM web console's ImportAlertRules feature. The vulnerability allows a remote attacker (with admin or config-admin privileges in the console) to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization.

CVE-2020-10656 proofpoint vulnerability CVSS: 7.5 06 Jan 2021, 14:15 UTC

The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM application server's WriteWindowMouseWithChunksV2 API. The vulnerability allows an anonymous remote attacker to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization.

CVE-2020-10655 proofpoint vulnerability CVSS: 7.5 06 Jan 2021, 14:15 UTC

The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM application server's WriteWindowMouse API. The vulnerability allows an anonymous remote attacker to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization.

CVE-2019-20634 proofpoint vulnerability CVSS: 4.3 30 Mar 2020, 21:15 UTC

An issue was discovered in Proofpoint Email Protection through 2019-09-08. By collecting scores from Proofpoint email headers, it is possible to build a copy-cat Machine Learning Classification model and extract insights from this model. The insights gathered allow an attacker to craft emails that receive preferable scores, with a goal of delivering malicious emails.

CVE-2019-19680 proofpoint vulnerability CVSS: 6.8 13 Jan 2020, 21:15 UTC

A file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD), in the unpatched versions of PPS through 8.9.22 and 8.14.2 respectively, allows attackers to bypass protection mechanisms (related to extensions, MIME types, virus detection, and journal entries for transmitted files) by sending malformed (not RFC compliant) multipart email.

CVE-2011-1905 proofpoint vulnerability CVSS: 6.8 05 May 2011, 14:55 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in unspecified administrative modules in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allow remote attackers to hijack the authentication of administrators via unknown vectors.

CVE-2011-1904 proofpoint vulnerability CVSS: 7.5 05 May 2011, 14:55 UTC

An unspecified function in the web interface in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote attackers to execute arbitrary commands via unknown vectors, related to a "command injection" issue.

CVE-2011-1903 proofpoint vulnerability CVSS: 7.5 05 May 2011, 14:55 UTC

SQL injection vulnerability in an unspecified function in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote attackers to execute arbitrary SQL commands via unknown vectors.

CVE-2011-1902 proofpoint vulnerability CVSS: 5.0 05 May 2011, 14:55 UTC

Directory traversal vulnerability in the web interface in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote attackers to read arbitrary files via unspecified vectors.

CVE-2011-1901 proofpoint vulnerability CVSS: 7.5 05 May 2011, 14:55 UTC

The mail-filter web interface in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote attackers to bypass authentication via unspecified vectors.

CVE-2004-2357 proofpoint vulnerability CVSS: 6.4 31 Dec 2004, 05:00 UTC

The embedded MySQL 4.0 server for Proofpoint Protection Server does not require a password for the root user of MySQL, which allows remote attackers to read or modify the backend database.