Vulnerability Description
Mailcow: dockerized is an open source groupware/email suite based on docker. A Cross-Site Scripting (XSS) vulnerability has been identified within the Quarantine UI of the system. This vulnerability poses a significant threat to administrators who utilize the Quarantine feature. An attacker can send a carefully crafted email containing malicious JavaScript code. This issue has been patched in version 2023-11.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailcow | Mailcow\ | < 2023-11, _dockerized |
Related Weaknesses (CWE)
References
- https://github.com/mailcow/mailcow-dockerized/releases/tag/2023-11Release Notes
- https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-46x4-w2fmVendor Advisory
- https://github.com/mailcow/mailcow-dockerized/releases/tag/2023-11Release Notes
- https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-46x4-w2fmVendor Advisory
FAQ
What is CVE-2023-49077?
CVE-2023-49077 is a vulnerability with a CVSS score of 8.3 (HIGH). Mailcow: dockerized is an open source groupware/email suite based on docker. A Cross-Site Scripting (XSS) vulnerability has been identified within the Quarantine UI of the system. This vulnerability p...
How severe is CVE-2023-49077?
CVE-2023-49077 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49077?
Check the references section above for vendor advisories and patch information. Affected products include: Mailcow Mailcow\.