Remote SQL Injection in Exim 4.98 Affects Multiple Versions
CVE-2025-26794

7.5HIGH

Key Information:

Vendor

Exim

Status
Vendor
CVE Published:
21 February 2025

Badges

📈 Score: 517👾 Exploit Exists🟡 Public PoC🟣 EPSS 43%

What is CVE-2025-26794?

CVE-2025-26794 is a critical vulnerability found in the Exim mail transfer agent, specifically in versions prior to 4.98.1. Exim is widely used for routing and delivering email on Unix-like operating systems. This vulnerability allows for remote SQL injection attacks under certain configurations utilizing SQLite hints and ETRN serialization. If exploited, this flaw could lead to unauthorized manipulation of the database, potentially compromising sensitive data and affecting email delivery systems, which are central to organizational communications.

Technical Details

The vulnerability in question enables an attacker to inject malicious SQL commands through remote queries, leveraging specific features of the Exim software. This SQL injection can occur when the affected versions process challenges related to the SQLite database without adequate input validation. Malicious actors can exploit this weakness to execute arbitrary SQL commands, potentially leading to complete control over the database or even the underlying system depending on the privileges granted to the database user.

Potential Impact of CVE-2025-26794

  1. Data Breaches: Attackers could gain unauthorized access to sensitive information stored in the database, leading to potential leaks of user data, credentials, or other confidential information.

  2. Service Disruption: Successful exploitation may allow attackers to manipulate email routing or delivery mechanisms, causing significant disruption in organizational communications and impacting business operations.

  3. System Compromise: Given that Exim operates with specific privileges, an attacker may escalate their access to the server or network, facilitating further attacks or the installation of malware, exacerbating the overall security risk.

Affected Version(s)

Exim 4.98 < 4.98.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

43% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-26794 : Remote SQL Injection in Exim 4.98 Affects Multiple Versions