Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mailcow
Mailcow mailcow Dockerized |
|
| Vendors & Products |
Mailcow
Mailcow mailcow Dockerized |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mailcow: dockerized is an open source groupware/email suite based on docker. In versions prior to 2026-03b, the Quarantine details modal injects attachment filenames into HTML without escaping, allowing arbitrary HTML/JS execution. An attacker can deliver an email with a crafted attachment name so that when an admin views the quarantine item, JavaScript executes in their browser, taking over their account. Version 2026-03b fixes the vulnerability. | |
| Title | mailcow: dockerized vulnerable to stored XSS in Quarantine attachment filenames | |
| Weaknesses | CWE-79 CWE-80 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T19:39:19.981Z
Reserved: 2026-04-15T15:57:41.718Z
Link: CVE-2026-40873
Updated: 2026-04-21T19:39:09.220Z
Status : Deferred
Published: 2026-04-21T20:17:00.820
Modified: 2026-04-22T21:02:31.267
Link: CVE-2026-40873
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:45:48Z