Hi,

On 2025-08-09 11:40:28, Salvatore Bonaccorso wrote:
Hi Jordi,

The following vulnerability was published for sogo.

CVE-2025-50340[0]:
| An Insecure Direct Object Reference (IDOR) vulnerability was
| discovered in SOGo Webmail thru 5.6.0, allowing an authenticated
| user to send emails on behalf of other users by manipulating a user-
| controlled identifier in the email-sending request. The server fails
| to verify whether the authenticated user is authorized to use the
| specified sender identity, resulting in unauthorized message
| delivery as another user. This can lead to impersonation, phishing,
| or unauthorized communication within the system.

it is unclear if this is something which can be tackled in SoGo, and
if there is a fixed version upstream. That the CVE description
mentions only versions up to 5.6.0 is unfortunately no clear
indication, and neither the 5.7.0 release notes seem to have something
in that direcion.

Can you thus please investigate (keep [email protected] in loop please)?

today one of the upstream developers made a statement on CVE-2025-50340:

https://www.mail-archive.com/users%40sogo.nu/msg34098.html

Best regards

Peter

Attachment: OpenPGP_0x5D5F6C020398A60A.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to