Home

Description

SOGo versions 5.12.7 and prior contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel.

PUBLISHED Reserved 2026-05-18 | Published 2026-05-18 | Updated 2026-05-19 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
affected

5.12.8 (git)
unaffected

Any version
affected

Credits

dninh of SACOMBANK finder

References

github.com/Alinto/sogo/releases/tag/SOGo-5.12.8 issue-tracking

www.sogo.nu/news/2026/sogo-v5128-released.html patch

www.vulncheck.com/...ql-injection-via-adduserinacls-endpoint third-party-advisory

cve.org (CVE-2026-8851)

nvd.nist.gov (CVE-2026-8851)

Download JSON