HTML Injection Vulnerability in mailcow: dockerized Email Suite by Mailcow
CVE-2026-40873

8.9HIGH

Key Information:

Vendor

Mailcow

Vendor
CVE Published:
21 April 2026

What is CVE-2026-40873?

mailcow: dockerized, an open-source groupware and email suite, suffers from an HTML injection vulnerability due to improper handling of attachment filenames in the Quarantine details modal. When an administrator views a quarantined item, the system injects unescaped attachment names into the HTML, which can lead to the execution of arbitrary JavaScript. This could allow an attacker to take control of the admin's account if a malicious email with a crafted attachment name is delivered. The issue has been addressed in version 2026-03b.

Affected Version(s)

mailcow-dockerized < 2026-03b

References

CVSS V4

Score:
8.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.