Vulnerabilities (CVE)

Filtered by vendor Mailcow Subscribe
Filtered by product Mailcow\
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-31138 1 Mailcow 1 Mailcow\ 2022-07-18 9.0 HIGH 8.8 HIGH
mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.
CVE-2022-31245 1 Mailcow 1 Mailcow\ 2022-06-02 9.0 HIGH 8.8 HIGH
mailcow before 2022-05d allows a remote authenticated user to inject OS commands and escalate privileges to domain admin via the --debug option in conjunction with the ---PIPEMESS option in Sync Jobs.
CVE-2017-8928 1 Mailcow 1 Mailcow\ 2019-10-02 6.8 MEDIUM 8.8 HIGH
mailcow 0.14, as used in "mailcow: dockerized" and other products, has CSRF.