CVE-2022-31138

HIGH

mailcow <2022-06a - Privilege Escalation

Title source: llm
STIX 2.1

Description

mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.

Exploits (1)

nomisec WORKING POC 2 stars
by ly1g3 · poc
https://github.com/ly1g3/Mailcow-CVE-2022-31138

References (4)

Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/ly1g3/Mailcow-CVE-2022-31138
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/mailcow/mailcow-dockerized/releases/tag/2022-06a

Scores

CVSS v3 8.8
EPSS 0.0609
EPSS Percentile 90.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (1)
mailcow/mailcow\ < 2022-06a
Published Jul 11, 2022
Tracked Since Feb 18, 2026