Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | dovecot: dovecot: Denial of Service via IMAP SETACL command injection | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 18 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | IMAP SETACL Allows Injection of Anyone Permission in Dovecot ACL File |
Mon, 18 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dovecot
Dovecot dovecot Open-xchange dovecot |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:* cpe:2.3:a:open-xchange:dovecot:*:*:*:*:pro:*:*:* |
|
| Vendors & Products |
Dovecot
Dovecot dovecot Open-xchange dovecot |
Tue, 12 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-xchange
Open-xchange ox Dovecot Pro |
|
| Vendors & Products |
Open-xchange
Open-xchange ox Dovecot Pro |
Tue, 12 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | IMAP SETACL Allows Injection of Anyone Permission in Dovecot ACL File |
Tue, 12 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Attacker can use the IMAP SETACL command to inject the anyone permission to user's dovecot-acl file even if imap_acl_allow_anyone=no. This causes folders to be spammed to all users. The impact is limited to being able to spam folders to other users, no unexpected access is gained. Install to fixed version. No publicly available exploits are known. | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-05-12T15:40:12.510Z
Reserved: 2026-04-08T09:59:59.342Z
Link: CVE-2026-40020
Updated: 2026-05-12T15:40:08.183Z
Status : Analyzed
Published: 2026-05-12T14:17:03.687
Modified: 2026-05-18T17:36:04.530
Link: CVE-2026-40020
OpenCVE Enrichment
Updated: 2026-05-19T02:00:14Z