Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| mailcow | mailcow-dockerized | < 2026-03b | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | mailcow < 2026-03b reflects raw REQUEST_URI into JavaScript and href links on the login page, allowing attackers to inject parameters that break JS logic and enable phishing. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-40878.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-40871 | 7.2 HIGH | mailcow: dockerized vulnerable to Second Order SQL Injection in quarantine category via AP |
| CVE-2026-40875 | mailcow: dockerized vulnerable to stored XSS in user login history real_rip | |
| CVE-2026-40872 | mailcow: dockerized vulnerable to stored XSS in autodiscover logs email address field | |
| CVE-2026-40874 | mailcow: dockerized missing authorization on Forwarding Hosts delete action | |
| CVE-2026-40873 | mailcow: dockerized vulnerable to stored XSS in Quarantine attachment filenames |
No comments yet