Análise pendenteCVE-2026-27851

CVE-2026-27851: SQL/LDAP Injection in OX Dovecot Pro

Plataforma

linux

Componente

dovecot

Corrigido em

3.1.5

CVE-2026-27851 describes a SQL/LDAP injection vulnerability within OX Dovecot Pro. This flaw arises from an incorrect interpretation of pipelines when the 'safe filter' is utilized with variable expansion, allowing attackers to bypass security measures. Versions 0.0.0 through 3.1.4 are affected, and a fix is available in version 3.1.5. No public exploits are currently known.

Impacto e Cenários de Ataquetraduzindo…

The vulnerability allows an attacker to inject malicious SQL or LDAP code into authentication processes. Successful exploitation could lead to unauthorized access to sensitive data, including user credentials, email content, and potentially system configuration information. The impact is particularly severe if Dovecot Pro is integrated with other systems, as a compromised Dovecot instance could serve as a pivot point for lateral movement within the network. While no public exploits are known, the potential for SQL/LDAP injection makes this a high-risk vulnerability, especially in environments where Dovecot Pro handles sensitive user data.

Contexto de Exploraçãotraduzindo…

CVE-2026-27851 was published on May 12, 2026. It is not currently listed on KEV (Kernel Exploit Vulnerability) or EPSS (Exploit Prediction Scoring System), suggesting a low to medium probability of exploitation. No public proof-of-concept (POC) code is currently available. Organizations should prioritize patching to mitigate the potential risk, especially given the sensitivity of data typically handled by email servers.

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N7.4HIGHAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityHighCondições necessárias para explorarPrivileges RequiredNoneNível de autenticação necessárioUser InteractionNoneSe a vítima precisa tomar uma açãoScopeUnchangedImpacto além do componente afetadoConfidentialityHighRisco de exposição de dados sensíveisIntegrityHighRisco de modificação não autorizada de dadosAvailabilityNoneRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Alta — exige condição de corrida, configuração não padrão ou circunstâncias específicas.
Privileges Required
Nenhum — sem autenticação necessária para explorar.
User Interaction
Nenhuma — ataque automático e silencioso. A vítima não faz nada.
Scope
Inalterado — impacto limitado ao componente vulnerável.
Confidentiality
Alto — perda total de confidencialidade. O atacante pode ler todos os dados.
Integrity
Alto — o atacante pode escrever, modificar ou excluir qualquer dado.
Availability
Nenhum — sem impacto na disponibilidade.

Software Afetado

Componentedovecot
FornecedorOpen-Xchange GmbH
Versão mínima0.0.0
Versão máxima3.1.4
Corrigido em3.1.5

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Publicada

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation is to upgrade to OX Dovecot Pro version 3.1.5 or later, which addresses the underlying issue. If immediate upgrading is not feasible, the 'safe filter' should be disabled until patching can be performed. This will prevent the vulnerable pipeline interpretation. Consider implementing stricter input validation and sanitization on any data used within Dovecot Pro's authentication pipelines as an additional layer of defense. Monitor Dovecot Pro logs for any suspicious activity or unusual authentication attempts. After upgrading, confirm the fix by attempting to trigger the vulnerable pipeline with malicious input and verifying that it is properly sanitized.

Como corrigirtraduzindo…

Actualice a la versión 3.1.5 o superior para mitigar la vulnerabilidad. La versión 2.4.4 también corrige el problema. Esta actualización corrige una falla de interpretación incorrecta de los filtros seguros, lo que permite inyecciones SQL/LDAP.

Perguntas frequentestraduzindo…

What is CVE-2026-27851 — SQL/LDAP Injection in OX Dovecot Pro?

CVE-2026-27851 is a HIGH severity vulnerability in OX Dovecot Pro versions 0.0.0–3.1.4. It allows attackers to inject malicious SQL or LDAP code via misuse of the 'safe filter', potentially leading to unauthorized access to sensitive data.

Am I affected by CVE-2026-27851 in OX Dovecot Pro?

If you are running OX Dovecot Pro versions 0.0.0 through 3.1.4 and are using the 'safe filter', you are potentially affected by this vulnerability. Upgrade to version 3.1.5 or later to mitigate the risk.

How do I fix CVE-2026-27851 in OX Dovecot Pro?

The recommended fix is to upgrade to OX Dovecot Pro version 3.1.5 or later. As a temporary workaround, disable the 'safe filter' until patching can be performed.

Is CVE-2026-27851 being actively exploited?

Currently, no public exploits are known for CVE-2026-27851. However, the potential for SQL/LDAP injection warrants prompt patching to prevent future exploitation.

Where can I find the official OX Dovecot Pro advisory for CVE-2026-27851?

Please refer to the official OX website and security advisories for the most up-to-date information regarding CVE-2026-27851 and OX Dovecot Pro: [https://www.ox.com/](https://www.ox.com/)

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.

ao vivoverificação gratuita

Experimente agora — sem conta

Faça upload de qualquer manifesto (composer.lock, package-lock.json, lista de plugins WordPress…) ou cole sua lista de componentes. Receba um relatório de vulnerabilidades instantaneamente. Fazer upload de um arquivo é só o começo: com uma conta, você obtém monitoramento contínuo, alertas por Slack/email, relatórios multiprojeto e white-label.

Escaneamento manualAlertas por Slack/e-mailMonitoramento ContínuoRelatórios de marca branca

Arraste e solte seu arquivo de dependências

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...