CVE-2026-27602

HIGH

Modoboa has an OS Command Injection

Title source: cna
STIX 2.1

Description

Modoboa is a mail hosting and management platform. Prior to version 2.7.1, `exec_cmd()` in `modoboa/lib/sysutils.py` always runs subprocess calls with `shell=True`. Since domain names flow directly into shell command strings without any sanitization, a Reseller or SuperAdmin can include shell metacharacters in a domain name to run arbitrary OS commands on the server. Version 2.7.1 patches the issue.

Scores

CVSS v3 7.2
EPSS 0.0007
EPSS Percentile 21.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (2)
modoboa/modoboa < 2.7.1 (2 CPE variants)
pypi/modoboa 0 - 2.7.1PyPI
Published Mar 25, 2026
Tracked Since Mar 26, 2026