Remote SQL Injection in Exim 4.98 Affects Multiple Versions
CVE-2025-26794
Key Information:
Badges
What is CVE-2025-26794?
CVE-2025-26794 is a critical vulnerability found in the Exim mail transfer agent, specifically in versions prior to 4.98.1. Exim is widely used for routing and delivering email on Unix-like operating systems. This vulnerability allows for remote SQL injection attacks under certain configurations utilizing SQLite hints and ETRN serialization. If exploited, this flaw could lead to unauthorized manipulation of the database, potentially compromising sensitive data and affecting email delivery systems, which are central to organizational communications.
Technical Details
The vulnerability in question enables an attacker to inject malicious SQL commands through remote queries, leveraging specific features of the Exim software. This SQL injection can occur when the affected versions process challenges related to the SQLite database without adequate input validation. Malicious actors can exploit this weakness to execute arbitrary SQL commands, potentially leading to complete control over the database or even the underlying system depending on the privileges granted to the database user.
Potential Impact of CVE-2025-26794
-
Data Breaches: Attackers could gain unauthorized access to sensitive information stored in the database, leading to potential leaks of user data, credentials, or other confidential information.
-
Service Disruption: Successful exploitation may allow attackers to manipulate email routing or delivery mechanisms, causing significant disruption in organizational communications and impacting business operations.
-
System Compromise: Given that Exim operates with specific privileges, an attacker may escalate their access to the server or network, facilitating further attacks or the installation of malware, exacerbating the overall security risk.
Affected Version(s)
Exim 4.98 < 4.98.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
43% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved