SOGo versions 5.12.7 and prior contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel.
History

Tue, 19 May 2026 14:30:00 +0000

Type Values Removed Values Added
Description SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel. SOGo versions 5.12.7 and prior contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel.
Title SOGo 5.12.7 SQL Injection via addUserInAcls endpoint SOGo < 5.12.8 SQL Injection via addUserInAcls endpoint

Tue, 19 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Alinto
Alinto sogo Web Mail
Vendors & Products Alinto
Alinto sogo Web Mail

Mon, 18 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel.
Title SOGo 5.12.7 SQL Injection via addUserInAcls endpoint
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-05-18T20:10:10.844Z

Updated: 2026-05-19T13:37:56.994Z

Reserved: 2026-05-18T16:00:14.954Z

Link: CVE-2026-8851

cve-icon Vulnrichment

Updated: 2026-05-19T12:16:10.404Z

cve-icon NVD

Status : Deferred

Published: 2026-05-18T21:16:41.777

Modified: 2026-05-19T15:16:33.277

Link: CVE-2026-8851

cve-icon Redhat

No data.