Unrated severityNVD Advisory· Published Jul 11, 2022· Updated Apr 22, 2025
OS Command Injection in mailcow
CVE-2022-31138
Description
mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the update.sh script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.
Affected products
1- Range: < 2022-06a
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/mailcow/mailcow-dockerized/commit/d373164e13a14e058f82c9f1918a5612f375a9f9mitrex_refsource_MISC
- github.com/mailcow/mailcow-dockerized/releases/tag/2022-06amitrex_refsource_MISC
- github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-vx9w-h33p-5vhcmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.