分析待ちCVE-2026-27851

CVE-2026-27851: SQL/LDAP Injection in OX Dovecot Pro

プラットフォーム

linux

コンポーネント

dovecot

修正版

3.1.5

CVE-2026-27851 describes a SQL/LDAP injection vulnerability within OX Dovecot Pro. This flaw arises from an incorrect interpretation of pipelines when the 'safe filter' is utilized with variable expansion, allowing attackers to bypass security measures. Versions 0.0.0 through 3.1.4 are affected, and a fix is available in version 3.1.5. No public exploits are currently known.

影響と攻撃シナリオ翻訳中…

The vulnerability allows an attacker to inject malicious SQL or LDAP code into authentication processes. Successful exploitation could lead to unauthorized access to sensitive data, including user credentials, email content, and potentially system configuration information. The impact is particularly severe if Dovecot Pro is integrated with other systems, as a compromised Dovecot instance could serve as a pivot point for lateral movement within the network. While no public exploits are known, the potential for SQL/LDAP injection makes this a high-risk vulnerability, especially in environments where Dovecot Pro handles sensitive user data.

悪用の状況翻訳中…

CVE-2026-27851 was published on May 12, 2026. It is not currently listed on KEV (Kernel Exploit Vulnerability) or EPSS (Exploit Prediction Scoring System), suggesting a low to medium probability of exploitation. No public proof-of-concept (POC) code is currently available. Organizations should prioritize patching to mitigate the potential risk, especially given the sensitivity of data typically handled by email servers.

脅威インテリジェンス

エクスプロイト状況

概念実証不明
CISA KEVNO
インターネット露出

CVSS ベクトル

脅威インテリジェンス· CVSS 3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N7.4HIGHAttack VectorNetwork攻撃者がターゲットに到達する方法Attack ComplexityHigh悪用に必要な条件Privileges RequiredNone攻撃に必要な認証レベルUser InteractionNone被害者の操作が必要かどうかScopeUnchanged影響コンポーネント外への波及ConfidentialityHigh機密データ漏洩のリスクIntegrityHigh不正データ改ざんのリスクAvailabilityNoneサービス障害のリスクnextguardhq.com · CVSS v3.1 基本スコア
これらのメトリクスの意味は?
Attack Vector
ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
Attack Complexity
高 — 競合条件、非標準設定、または特定の状況が必要。悪用が難しい。
Privileges Required
なし — 認証不要。資格情報なしで悪用可能。
User Interaction
なし — 自動かつ無音の攻撃。被害者は何もしない。
Scope
変化なし — 影響は脆弱なコンポーネントのみ。
Confidentiality
高 — 機密性の完全喪失。全データが読み取り可能。
Integrity
高 — 任意のデータの書き込み・変更・削除が可能。
Availability
なし — 可用性への影響なし。

影響を受けるソフトウェア

コンポーネントdovecot
ベンダーOpen-Xchange GmbH
最小バージョン0.0.0
最大バージョン3.1.4
修正版3.1.5

弱点分類 (CWE)

タイムライン

  1. 公開日

緩和策と回避策翻訳中…

The primary mitigation is to upgrade to OX Dovecot Pro version 3.1.5 or later, which addresses the underlying issue. If immediate upgrading is not feasible, the 'safe filter' should be disabled until patching can be performed. This will prevent the vulnerable pipeline interpretation. Consider implementing stricter input validation and sanitization on any data used within Dovecot Pro's authentication pipelines as an additional layer of defense. Monitor Dovecot Pro logs for any suspicious activity or unusual authentication attempts. After upgrading, confirm the fix by attempting to trigger the vulnerable pipeline with malicious input and verifying that it is properly sanitized.

修正方法翻訳中…

Actualice a la versión 3.1.5 o superior para mitigar la vulnerabilidad. La versión 2.4.4 también corrige el problema. Esta actualización corrige una falla de interpretación incorrecta de los filtros seguros, lo que permite inyecciones SQL/LDAP.

よくある質問翻訳中…

What is CVE-2026-27851 — SQL/LDAP Injection in OX Dovecot Pro?

CVE-2026-27851 is a HIGH severity vulnerability in OX Dovecot Pro versions 0.0.0–3.1.4. It allows attackers to inject malicious SQL or LDAP code via misuse of the 'safe filter', potentially leading to unauthorized access to sensitive data.

Am I affected by CVE-2026-27851 in OX Dovecot Pro?

If you are running OX Dovecot Pro versions 0.0.0 through 3.1.4 and are using the 'safe filter', you are potentially affected by this vulnerability. Upgrade to version 3.1.5 or later to mitigate the risk.

How do I fix CVE-2026-27851 in OX Dovecot Pro?

The recommended fix is to upgrade to OX Dovecot Pro version 3.1.5 or later. As a temporary workaround, disable the 'safe filter' until patching can be performed.

Is CVE-2026-27851 being actively exploited?

Currently, no public exploits are known for CVE-2026-27851. However, the potential for SQL/LDAP injection warrants prompt patching to prevent future exploitation.

Where can I find the official OX Dovecot Pro advisory for CVE-2026-27851?

Please refer to the official OX website and security advisories for the most up-to-date information regarding CVE-2026-27851 and OX Dovecot Pro: [https://www.ox.com/](https://www.ox.com/)

あなたのプロジェクトは影響を受けていますか?

依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。

scanZone.liveBadgescanZone.eyebrow

今すぐ試す — アカウント不要

Upload any manifest (composer.lock, package-lock.json, WordPress plugin list…) or paste your component list. You get a vulnerability report instantly. Uploading a file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.

手動スキャンSlack/メールアラートContinuous monitoringホワイトラベルレポート

依存関係ファイルをドラッグ&ドロップ

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...