Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mailcow
Mailcow mailcow Dockerized |
|
| Vendors & Products |
Mailcow
Mailcow mailcow Dockerized |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mailcow: dockerized is an open source groupware/email suite based on docker. In versions prior to 2026-03b, the admin dashboard's Autodiscover logs render the EMailAddress value (logged as the "user" field) without HTML escaping. By submitting an unauthenticated Autodiscover request with a crafted EMailAddress containing HTML/JS, the payload is stored in Redis and executed when an admin views the Autodiscover logs. Version 2026-03b fixes the vulnerability. | |
| Title | mailcow: dockerized vulnerable to stored XSS in autodiscover logs email address field | |
| Weaknesses | CWE-79 CWE-80 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T13:37:20.223Z
Reserved: 2026-04-15T15:57:41.718Z
Link: CVE-2026-40872
Updated: 2026-04-22T13:37:12.392Z
Status : Deferred
Published: 2026-04-21T20:17:00.673
Modified: 2026-04-22T21:02:31.267
Link: CVE-2026-40872
No data.
OpenCVE Enrichment
Updated: 2026-04-22T05:45:09Z