CVE-2026-27602

| EUVD-2026-15951 HIGH
2026-03-25 https://github.com/modoboa/modoboa GHSA-wwv8-cqpr-vx3m
7.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
EUVD ID Assigned
Mar 25, 2026 - 17:17 euvd
EUVD-2026-15951
Analysis Generated
Mar 25, 2026 - 17:17 vuln.today
Patch Released
Mar 25, 2026 - 17:17 nvd
Patch available
CVE Published
Mar 25, 2026 - 17:03 nvd
HIGH 7.2

Description

### Summary `exec_cmd()` in `modoboa/lib/sysutils.py` always runs subprocess calls with `shell=True`. Since domain names flow directly into shell command strings without any sanitization, a Reseller or SuperAdmin can include shell metacharacters in a domain name to run arbitrary OS commands on the server. ### Details The root cause is in `modoboa/lib/sysutils.py:31`: ```python kwargs["shell"] = True process = subprocess.Popen(cmd, **kwargs) ``` When a create a domain is created with DKIM enabled, the domain name gets embedded into a shell command like this: ```python exec_cmd(f"openssl genrsa -out {dkim_storage_dir}/{domain.name}.pem {key_size}") ``` If the domain name contains something like `$(id>/tmp/proof).example.com`, the shell executes the injected command before running openssl. The same pattern appears in several other places: - `modoboa/admin/jobs.py:38` - mailbox rename via `mv` using `full_address` - `modoboa/amavis/lib.py:202` - `sa-learn` using `domain.name` - `modoboa/admin/models/mailbox.py:150` - `doveadm user` using `full_address` - `modoboa/maillog/graphics.py:105-107` - `rrdtool` using `domain.name` - `modoboa/webmail/models.py:54-57` - `doveadm move/delete` using `account.email` ### PoC 1. Deploy modoboa <= 2.7.0 2. Log in as a Reseller or SuperAdmin 3. Create a new domain named `$(id>/tmp/proof).example.com` with DKIM enabled 4. SSH into the server and read `/tmp/proof` Something like this will be displayed: ``` uid=0(root) gid=0(root) groups=0(root) ``` Confirmed on commit b521bcb4f (latest main at time of discovery). ### Impact An attacker with Reseller-level access (or higher) can execute arbitrary OS commands on the mail server - in a typical Modoboa deployment this means running as root. All six identified sinks are reachable through normal application workflows.

Analysis

Modoboa, an open-source mail server management platform, contains a command injection vulnerability in its subprocess execution handler that allows authenticated Reseller or SuperAdmin users to execute arbitrary operating system commands. A proof-of-concept exploit exists demonstrating how shell metacharacters in domain names can achieve code execution, typically as root in standard deployments. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all Modoboa deployments and identify versions currently in use; restrict administrative access to trusted personnel only. Within 7 days: Apply patch to version 2.7.1 or later on all affected systems, prioritizing production mail servers. …

Sign in for detailed remediation steps.

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

CVE-2026-27602 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy