OXDC-ADV-2026-0002
Vulnerability from csaf_ox - Published: 2026-05-05 00:00 - Updated: 2026-05-12 00:00When safe filter is used with variable expansion, all following pipelines on the same string are incorrectly interpreted as safe too, enabling unsafe data to be unescaped.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:*
|
3.1.5 | |
|
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
|
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:*
|
2.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 3.1.4
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.1.4:*:*:*:*:*:*:*
|
3.1.4 |
Vendor Fix
|
|
OX Dovecot CE 2.4.3
Open-Xchange GmbH / OX Dovecot CE
|
cpe:2.3:a:open-xchange:dovecot:2.4.3:*:*:*:*:*:*:*
|
2.4.3 |
Vendor Fix
|
Attacker can upload a malicious Sieve script over ManageSieve service (or locally) to bypass configured CPU time limits for Sieve up to 130 times of the configured limit.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:*
|
3.1.5 | |
|
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
|
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:*
|
2.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 2.3.0
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:2.3.0:*:*:*:*:*:*:*
|
2.3.0 |
Vendor Fix
|
Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:*
|
3.1.5 | |
|
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
|
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:*
|
2.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 3.1.0
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.1.0:*:*:*:*:*:*:*
|
3.1.0 |
Vendor Fix
|
|
OX Dovecot CE 2.4.0
Open-Xchange GmbH / OX Dovecot CE
|
cpe:2.3:a:open-xchange:dovecot:2.4.0:*:*:*:*:*:*:*
|
2.4.0 |
Vendor Fix
|
Attacker can use the IMAP SETACL command to inject the anyone permission to user's dovecot-acl file even if imap_acl_allow_anyone=no. This causes folders to be spammed to all users.
CWE-284 - Improper Access Control| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:*
|
3.1.5 | |
|
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
|
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:*
|
2.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 2.3.0
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:2.3.0:*:*:*:*:*:*:*
|
2.3.0 |
Vendor Fix
|
An attacker can cause uncontrolled memory usage with excessive bracing over IMAP. The fix in CVE-2026-27857 was incomplete, only blocking one way of doing this, so there was still another way left open. In particular, the fix was for closing braces, but you could still use open braces to bypass the limit.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:*
|
3.1.5 | |
|
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
|
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:*
|
2.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OX Dovecot Pro 3.0.5
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.0.5:*:*:*:*:*:*:*
|
3.0.5 |
Vendor Fix
|
|
OX Dovecot Pro 3.1.4
Open-Xchange GmbH / OX Dovecot Pro
|
cpe:2.3:a:open-xchange:dovecot:3.1.4:*:*:*:*:*:*:*
|
3.1.4 |
Vendor Fix
|
|
OX Dovecot CE 2.4.3
Open-Xchange GmbH / OX Dovecot CE
|
cpe:2.3:a:open-xchange:dovecot:2.4.3:*:*:*:*:*:*:*
|
2.4.3 |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"text": "HIGH"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Open-Xchange GmbH. All rights reserved.",
"tlp": {
"label": "GREEN",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License (https://creativecommons.org/licenses/by-nd/4.0/). If you distribute this content, you must provide attribution to Open-Xchange GmbH and provide a link to the original. You may not distribute a modified version of this content.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"name": "Open-Xchange GmbH",
"namespace": "https://open-xchange.com/"
},
"references": [
{
"category": "self",
"summary": "Canonical CSAF document",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0002.json"
},
{
"category": "self",
"summary": "Markdown representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/md/2026/oxdc-adv-2026-0002.md"
},
{
"category": "self",
"summary": "HTML representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/html/2026/oxdc-adv-2026-0002.html"
},
{
"category": "self",
"summary": "Plain-text representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/txt/2026/oxdc-adv-2026-0002.txt"
}
],
"title": "OX Dovecot Security Advisory OXDC-ADV-2026-0002",
"tracking": {
"current_release_date": "2026-05-12T00:00:00+00:00",
"generator": {
"date": "2026-05-12T13:38:55+00:00",
"engine": {
"name": "OX CSAF",
"version": "1.0.0"
}
},
"id": "OXDC-ADV-2026-0002",
"initial_release_date": "2026-05-05T00:00:00+00:00",
"revision_history": [
{
"date": "2026-05-05T00:00:00+00:00",
"number": "1",
"summary": "Initial release"
},
{
"date": "2026-05-12T00:00:00+00:00",
"number": "2",
"summary": "Public release"
},
{
"date": "2026-05-12T00:00:00+00:00",
"number": "3",
"summary": "Public release"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.1.4",
"product": {
"name": "OX Dovecot Pro 3.1.4",
"product_id": "OXDC-PRO_3.1.4",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "3.1.5",
"product": {
"name": "OX Dovecot Pro 3.1.5",
"product_id": "OXDC-PRO_3.1.5",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.3.0",
"product": {
"name": "OX Dovecot Pro 2.3.0",
"product_id": "OXDC-PRO_2.3.0",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "3.1.0",
"product": {
"name": "OX Dovecot Pro 3.1.0",
"product_id": "OXDC-PRO_3.1.0",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "3.0.5",
"product": {
"name": "OX Dovecot Pro 3.0.5",
"product_id": "OXDC-PRO_3.0.5",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.0.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "OX Dovecot Pro"
},
{
"branches": [
{
"category": "product_version",
"name": "2.4.3",
"product": {
"name": "OX Dovecot CE 2.4.3",
"product_id": "OXDC-CE_2.4.3",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.4.4",
"product": {
"name": "OX Dovecot CE 2.4.4",
"product_id": "OXDC-CE_2.4.4",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.4.0",
"product": {
"name": "OX Dovecot CE 2.4.0",
"product_id": "OXDC-CE_2.4.0",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "OX Dovecot CE"
}
],
"category": "vendor",
"name": "Open-Xchange GmbH"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"caprinuxx@yeswehack"
]
}
],
"cve": "CVE-2026-27851",
"cwe": {
"id": "CWE-235",
"name": "Improper Handling of Extra Parameters"
},
"discovery_date": "2026-03-29T16:37:17+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8967"
}
],
"notes": [
{
"category": "description",
"text": "When safe filter is used with variable expansion, all following pipelines on the same string are incorrectly interpreted as safe too, enabling unsafe data to be unescaped."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.1.5",
"OXDC-CE_2.4.4"
],
"last_affected": [
"OXDC-PRO_3.1.4",
"OXDC-CE_2.4.3"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T00:00:00+00:00",
"details": "Avoid using safe filter until on fixed version.",
"product_ids": [
"OXDC-PRO_3.1.4",
"OXDC-CE_2.4.3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.1.4",
"OXDC-CE_2.4.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "This can enable SQL / LDAP injection attacks when used in authentication."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "lib-var-expand: Safe filter leaks to all following pipelines"
},
{
"acknowledgments": [
{
"names": [
"djvirus@yeswehack"
]
}
],
"cve": "CVE-2026-40016",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2026-03-24T13:00:23+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8948"
}
],
"notes": [
{
"category": "description",
"text": "Attacker can upload a malicious Sieve script over ManageSieve service (or locally) to bypass configured CPU time limits for Sieve up to 130 times of the configured limit."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.1.5",
"OXDC-CE_2.4.4"
],
"last_affected": [
"OXDC-PRO_2.3.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T00:00:00+00:00",
"details": "Install fixed version, or alternatively prevent direct access to Sieve scripts via ManageSieve or local access.",
"product_ids": [
"OXDC-PRO_2.3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OXDC-PRO_2.3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Attacker can use this to degrade server performance and bypass configured CPU time limits for Sieve scripts."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "Sieve :contains/:matches O(N\u00d7M) Substring Match Bypasses sieve_max_cpu_time Limit (130\u00d7 Overrun)"
},
{
"acknowledgments": [
{
"names": [
"ylwango613@yeswehack"
]
}
],
"cve": "CVE-2026-33603",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2026-04-08T06:10:32+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-9030"
}
],
"notes": [
{
"category": "description",
"text": "Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.1.5",
"OXDC-CE_2.4.4"
],
"last_affected": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T00:00:00+00:00",
"details": "Install fixed version.",
"product_ids": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "login: Base64 input can contain tabs that bypass IPC protection"
},
{
"acknowledgments": [
{
"names": [
"ilhamaf@yeswehack"
]
}
],
"cve": "CVE-2026-40020",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2026-04-08T09:42:22+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-9040"
}
],
"notes": [
{
"category": "description",
"text": "Attacker can use the IMAP SETACL command to inject the anyone permission to user\u0027s dovecot-acl file even if imap_acl_allow_anyone=no. This causes folders to be spammed to all users."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.1.5",
"OXDC-CE_2.4.4"
],
"last_affected": [
"OXDC-PRO_2.3.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T00:00:00+00:00",
"details": "Install to fixed version.",
"product_ids": [
"OXDC-PRO_2.3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"OXDC-PRO_2.3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "The impact is limited to being able to spam folders to other users, no unexpected access is gained."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "IMAP folders can be shared-spammed to everyone"
},
{
"acknowledgments": [
{
"names": [
"D4RKCYPH3R@yeswehack"
]
}
],
"cve": "CVE-2026-42006",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2026-04-27T14:38:12+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-9138"
}
],
"notes": [
{
"category": "description",
"text": "An attacker can cause uncontrolled memory usage with excessive bracing over IMAP. The fix in CVE-2026-27857 was incomplete, only blocking one way of doing this, so there was still another way left open. In particular, the fix was for closing braces, but you could still use open braces to bypass the limit."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.1.5",
"OXDC-CE_2.4.4"
],
"last_affected": [
"OXDC-PRO_3.0.5",
"OXDC-PRO_3.1.4",
"OXDC-CE_2.4.3"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-05T00:00:00+00:00",
"details": "Install fixed version, or configure vsz_limit for imap process to low value.",
"product_ids": [
"OXDC-PRO_3.0.5",
"OXDC-PRO_3.1.4",
"OXDC-CE_2.4.3"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.0.5",
"OXDC-PRO_3.1.4",
"OXDC-CE_2.4.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Using excessive bracing, attacker can cause memory usage up to configured memory limit."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "imap-login: Excessive memory usage DoS - Try 2"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.