๐Ÿ” CVE Alert

CVE-2026-40871

HIGH 7.2

mailcow: dockerized vulnerable to Second Order SQL Injection in quarantine category via API

CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th

mailcow: dockerized is an open source groupware/email suite based on docker. Versions prior to 2026-03b have a second-order SQL injection vulnerability in the quarantine_category field via the Mailcow API. The /api/v1/add/mailbox endpoint stores quarantine_category without validation or sanitization. This value is later used by quarantine_notify.py, which constructs SQL queries using unsafe % string formatting instead of parameterized queries. This results in a delayed (second-order) SQL injection when the quarantine notification job executes, allowing an attacker to inject arbitrary SQL. Using a UNION SELECT, sensitive data (e.g., admin credentials) can be exfiltrated and rendered inside quarantine notification emails. Version 2026-03b fixes the vulnerability.

CWE CWE-20 CWE-89 CWE-116 CWE-564
Vendor mailcow
Product mailcow-dockerized
Published Apr 21, 2026
Last Updated Apr 21, 2026
Stay Ahead of the Next One

Get instant alerts for mailcow mailcow-dockerized

Be the first to know when new high vulnerabilities affecting mailcow mailcow-dockerized are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

mailcow / mailcow-dockerized
< 2026-03b

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-r8fq-wrfm-cj2q