Second-Order SQL Injection in Mailcow Dockerized Open Source Suite
CVE-2026-40871
What is CVE-2026-40871?
Mailcow: dockerized, an open-source groupware and email suite, is susceptible to a second-order SQL injection due to improper handling of the quarantine_category field via the Mailcow API. Specifically, the vulnerability arises from the /api/v1/add/mailbox endpoint, which inadequately stores the quarantine_category without any validation or sanitization measures. This flaw allows attackers to craft SQL queries with unsafe string formatting instead of utilizing parameterized queries. Consequently, when the quarantine notification job runs, it becomes possible for an attacker to inject arbitrary SQL code. This can lead to severe data breaches, as sensitive information, such as admin credentials, could be leaked through the quarantine notification emails. The issue is resolved in version 2026-03b.
Affected Version(s)
mailcow-dockerized < 2026-03b
