Description
Dovecot has provided a script to use for attachment to text conversion. This script unsafely handles zip-style attachments. Attacker can use specially crafted OOXML documents to cause unintended files on the system to be indexed and subsequently ending up in FTS indexes. Do not use the provided script, instead, use something else like FTS tika. No publicly available exploits are known.
Published: 2026-03-27
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Use Alternative Script
AI Analysis

Impact

Dovecot’s attachment conversion script mishandles zip‑style OOXML documents, allowing an attacker to inject unintended local files into the full‑text search index. This leads to the exposure of potentially sensitive data through the FTS mechanism, representing an information disclosure vulnerability rooted in improper parsing of XML (CWE‑611) and a broader information exposure (CWE‑200).

Affected Systems

The flaw impacts Open‑Xchange GmbH’s OX Dovecot Pro product. No specific affected revision numbers are listed, so any deployment that utilizes the default attachment conversion script is potentially vulnerable.

Risk and Exploitability

The calculated CVSS score of 4.3 classifies the issue as low severity, and an EPSS score below 1% indicates a very low likelihood of active exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an attacker to supply crafted OOXML attachments processed by the script; no public exploits are known at this time.

Generated by OpenCVE AI on March 28, 2026 at 13:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Discontinue use of the bundled attachment conversion script
  • Employ an alternative FTS solution such as Apache Tika
  • Verify that only trusted or validated attachments are processed
  • Monitor vendor advisories for an official patch or update
  • Configure file‐oriented security controls to prevent unauthorized indexing

Generated by OpenCVE AI on March 28, 2026 at 13:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6197-1 dovecot security update
Ubuntu USN Ubuntu USN USN-8136-1 Dovecot vulnerabilities
History

Wed, 29 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Dovecot
Dovecot dovecot
Open-xchange dovecot
CPEs cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*
cpe:2.3:a:open-xchange:dovecot:*:*:*:*:pro:*:*:*
Vendors & Products Dovecot
Dovecot dovecot
Open-xchange dovecot

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Open-xchange
Open-xchange ox Dovecot Pro
Vendors & Products Open-xchange
Open-xchange ox Dovecot Pro

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title Unsafe Attachment Conversion Script Allows Unauthorized File Indexing via Crafted OOXML dovecot: Dovecot: Information disclosure via specially crafted OOXML documents
Weaknesses CWE-611
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 27 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Title Unsafe Attachment Conversion Script Allows Unauthorized File Indexing via Crafted OOXML

Fri, 27 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description Dovecot has provided a script to use for attachment to text conversion. This script unsafely handles zip-style attachments. Attacker can use specially crafted OOXML documents to cause unintended files on the system to be indexed and subsequently ending up in FTS indexes. Do not use the provided script, instead, use something else like FTS tika. No publicly available exploits are known.
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Dovecot Dovecot
Open-xchange Dovecot Ox Dovecot Pro
cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2026-03-27T19:42:40.634Z

Reserved: 2025-09-08T14:22:28.105Z

Link: CVE-2025-59031

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T09:16:18.783

Modified: 2026-04-29T19:13:14.380

Link: CVE-2025-59031

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-27T08:10:15Z

Links: CVE-2025-59031 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:59:48Z

Weaknesses