Vulnerabilities (CVE)

Filtered by vendor Mailcow Subscribe
Filtered by product Mailcow\
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-49077 1 Mailcow 1 Mailcow\ 2023-12-05 N/A 6.1 MEDIUM
Mailcow: dockerized is an open source groupware/email suite based on docker. A Cross-Site Scripting (XSS) vulnerability has been identified within the Quarantine UI of the system. This vulnerability poses a significant threat to administrators who utilize the Quarantine feature. An attacker can send a carefully crafted email containing malicious JavaScript code. This issue has been patched in version 2023-11.
CVE-2022-31138 1 Mailcow 1 Mailcow\ 2022-07-18 9.0 HIGH 8.8 HIGH
mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.
CVE-2022-31245 1 Mailcow 1 Mailcow\ 2022-06-02 9.0 HIGH 8.8 HIGH
mailcow before 2022-05d allows a remote authenticated user to inject OS commands and escalate privileges to domain admin via the --debug option in conjunction with the ---PIPEMESS option in Sync Jobs.
CVE-2017-8928 1 Mailcow 1 Mailcow\ 2019-10-02 6.8 MEDIUM 8.8 HIGH
mailcow 0.14, as used in "mailcow: dockerized" and other products, has CSRF.