Description
mailcow: dockerized is an open source groupware/email suite based on docker. In versions prior to 2026-03b, the mailcow web interface passes the raw `$_SERVER['REQUEST_URI']` to Twig as a global template variable and renders it inside a JavaScript string literal in the `setLang()` helper of `base.twig`, relying on Twig's default HTML auto-escaping instead of the context-appropriate `js` escaping strategy. In addition, the `query_string()` Twig helper merges all current `$_GET` parameters into the language-switching links on the login page, so attacker-supplied parameters are reflected and preserved across navigation. Version 2026-03b fixes the vulnerability.
Published: 2026-04-21
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (reflected)
Action: Patch
AI Analysis

Impact

A reflected parameter injection flaw was discovered in the mailcow-dockerized web interface. When the login page is accessed, the raw request URI is passed to Twig as a global variable and rendered inside a JavaScript string literal. Because the default HTML escaping is used instead of JavaScript escaping, an attacker can embed malicious script content that will execute in the victim’s browser. The vulnerability allows an attacker to inject arbitrary JavaScript that runs with the privileges of the page, potentially facilitating credential theft, session hijacking, or other cross‑site attacks. The weakness is a classic reflected XSS, mapped to CWE‑79.

Affected Systems

The issue affects any installed instance of mailcow-dockerized version 2026‑03b and earlier. The affected component is the base.twig template in the mailcow web interface. The vendor has released patch 2026‑03b which eliminates the erroneous rendering of the request URI.

Risk and Exploitability

The CVSS score is 2.1, indicating a low severity if mitigated, but the vulnerability could be abused if an attacker successfully lures an administrator or user to a crafted URL. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog, suggesting limited exploitation data. The attack vector is reflected; the attacker must supply a URL that contains the malicious payload, and the victim must open the link in a browser that renders the login page. No authentication or privileged state is required for the exploit to be triggered. Consequently, while the risk is low in the absence of social‑engineering campaigns, the flaw still warrants immediate patching to eliminate the XSS surface.

Generated by OpenCVE AI on April 22, 2026 at 05:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade mailcow-dockerized to v2026‑03b or later, which removes the unsafe rendering of REQUEST_URI.
  • If upgrading is not immediately possible, temporarily strip or encode $_SERVER['REQUEST_URI'] before passing it to Twig, or modify base.twig to use the "js" escape strategy for the string literal. This removes the reflection path for malicious inputs.
  • Apply a temporary firewall rule or URL rewrite to reject or sanitize requests containing query parameters that encode JavaScript payloads targeting the login page.

Generated by OpenCVE AI on April 22, 2026 at 05:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
First Time appeared Mailcow
Mailcow mailcow Dockerized
Vendors & Products Mailcow
Mailcow mailcow Dockerized

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description mailcow: dockerized is an open source groupware/email suite based on docker. In versions prior to 2026-03b, the mailcow web interface passes the raw `$_SERVER['REQUEST_URI']` to Twig as a global template variable and renders it inside a JavaScript string literal in the `setLang()` helper of `base.twig`, relying on Twig's default HTML auto-escaping instead of the context-appropriate `js` escaping strategy. In addition, the `query_string()` Twig helper merges all current `$_GET` parameters into the language-switching links on the login page, so attacker-supplied parameters are reflected and preserved across navigation. Version 2026-03b fixes the vulnerability.
Title mailcow-dockerized Login Page has Reflected Parameter Injection / Wrong-Context XSS Escaping
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Mailcow Mailcow Dockerized
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-22T13:39:34.206Z

Reserved: 2026-04-15T15:57:41.719Z

Link: CVE-2026-40878

cve-icon Vulnrichment

Updated: 2026-04-22T13:39:26.423Z

cve-icon NVD

Status : Deferred

Published: 2026-04-21T20:17:01.403

Modified: 2026-04-22T21:02:31.267

Link: CVE-2026-40878

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T05:30:09Z

Weaknesses