Dovecot Vulnerabilities Allow SQL Injection, Authentication Bypass, Info Exposure
Summary
CERT-Bund has issued a security advisory for Dovecot, an open-source email server, detailing multiple vulnerabilities. These flaws, with a CVSS base score of 7.7, can be exploited by attackers to perform SQL injection, bypass authentication, expose sensitive information, or cause denial-of-service conditions. Mitigation is available.
What changed
CERT-Bund has released advisory WID-SEC-2026-0891 concerning multiple critical vulnerabilities in Dovecot, an open-source IMAP and POP3 email server. The vulnerabilities, rated with a CVSS base score of 7.7, allow remote attackers to conduct SQL injection attacks, bypass authentication mechanisms, disclose confidential information, and potentially cause denial-of-service conditions. The advisory affects Dovecot versions prior to 2.4.0 and prior to 2.4.3.
Organizations using affected versions of Dovecot must apply available mitigations immediately to prevent exploitation. This includes updating to a patched version or implementing specific security configurations as recommended by the vendor. Failure to address these vulnerabilities could lead to significant data breaches, unauthorized access to email accounts, and disruption of email services.
What to do next
- Update Dovecot to a patched version (e.g., 2.4.3 or later) or apply vendor-recommended mitigations.
- Review system logs for any signs of exploitation related to the described vulnerabilities.
- Assess the impact of potential information disclosure or authentication bypass on sensitive data.
Source document (simplified)
[WID-SEC-2026-0891] Dovecot: Mehrere Schwachstellen CVSS Base Score 7.7 (hoch) CVSS Temporal Score 6.7 (mittel) Remoteangriff ja Datum 26.03.2026 Stand 27.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
Produktbeschreibung
Dovecot ist ein Open Source IMAP und POP3 E-Mail Server.
Produkte
26.03.2026
- Open Source Dovecot <2.4.0
- Open Source Dovecot <2.4.3
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dovecot ausnutzen, um SQL-Injection-Angriffe durchzuführen, die Authentifizierung zu umgehen, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand herbeizuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.