Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wwv8-cqpr-vx3m | Modoboa has OS Command Injection |
Thu, 26 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:*:*:* |
Thu, 26 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Modoboa
Modoboa modoboa |
|
| Vendors & Products |
Modoboa
Modoboa modoboa |
Wed, 25 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Modoboa is a mail hosting and management platform. Prior to version 2.7.1, `exec_cmd()` in `modoboa/lib/sysutils.py` always runs subprocess calls with `shell=True`. Since domain names flow directly into shell command strings without any sanitization, a Reseller or SuperAdmin can include shell metacharacters in a domain name to run arbitrary OS commands on the server. Version 2.7.1 patches the issue. | |
| Title | Modoboa has an OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-26T15:38:37.459Z
Reserved: 2026-02-20T19:43:14.602Z
Link: CVE-2026-27602
Updated: 2026-03-26T15:38:28.266Z
Status : Analyzed
Published: 2026-03-25T19:16:48.430
Modified: 2026-03-26T16:30:21.993
Link: CVE-2026-27602
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:30:17Z
Github GHSA