Description
mailcow-dockerized contains a stored cross-site scripting vulnerability in the administrator Queue Manager. The Queue Manager fetches mail queue entries from /api/v1/get/mailq/all, copies server-controlled Postfix queue fields into DataTables rows, and renders several of those fields as HTML without adequate output encoding.



This issue affects mailcow-dockerized: 2026-03b.
Published: 2026-05-20
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows an attacker who can control the contents of the Postfix queue to embed malicious HTML into the administrator’s Queue Manager view. When the page renders the copied fields as unescaped HTML, an attacker can execute arbitrary JavaScript in the context of the admin’s browser session. The potential for the attacker to compromise that session is inferred, but the description does not specify specific outcomes such as session hijacking or credential theft. The weakness is a classic Stored XSS, identified as CWE‑79, and poses confidentiality, integrity, and availability risks constrained to users who can log into the administrative interface.

Affected Systems

The flaw is present in the mailcow‑dockerized 2026‑03b release, distributed by the mailcow vendor. Versions before 2026‑03b are not impacted, and any newer releases that include a fix would not be affected. All systems running the affected image and hosting the Queue Manager interface are vulnerable until the patch is applied or the feature is disabled.

Risk and Exploitability

With a CVSS score of 7.4, the vulnerability carries a high risk level. While the EPSS score is not available, the flaw is known to exist. It is not listed in the CISA KEV catalog. The likely attack path requires an attacker to have administrative access to the mailcow interface and then exploit the unescaped rendering of queue fields to inject script. If successful, the attacker can execute arbitrary JavaScript in the admin’s browser session, which may compromise that session or its data.

Generated by OpenCVE AI on May 20, 2026 at 04:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade mailcow‑dockerized to the latest release that contains the XSS fix. Check the vendor’s GitHub repository or release notes to confirm the patch version.
  • If an upgrade is not immediately possible, restrict access to the Queue Manager page to a minimal set of trusted administrators and apply a browser Content Security Policy that disallows inline scripts and unsafe‑eval usage for that page.
  • Configure the mailcow installation to escape all values rendered in the Queue Manager view, ensuring that any HTML inserted from the queue is treated as plain text rather than executable code.

Generated by OpenCVE AI on May 20, 2026 at 04:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 04:45:00 +0000

Type Values Removed Values Added
First Time appeared Mailcow
Mailcow mailcow Dockerized
Vendors & Products Mailcow
Mailcow mailcow Dockerized

Wed, 20 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description mailcow-dockerized contains a stored cross-site scripting vulnerability in the administrator Queue Manager. The Queue Manager fetches mail queue entries from /api/v1/get/mailq/all, copies server-controlled Postfix queue fields into DataTables rows, and renders several of those fields as HTML without adequate output encoding. This issue affects mailcow-dockerized: 2026-03b.
Title mailcow-dockerized 2026-03b - Stored XSS in Queue Manager via unescaped
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Mailcow Mailcow Dockerized
cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published:

Updated: 2026-05-20T12:48:15.205Z

Reserved: 2026-04-29T18:02:06.122Z

Link: CVE-2026-7460

cve-icon Vulnrichment

Updated: 2026-05-20T12:48:03.522Z

cve-icon NVD

Status : Deferred

Published: 2026-05-20T04:16:56.270

Modified: 2026-05-20T14:23:14.993

Link: CVE-2026-7460

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T05:00:17Z

Weaknesses