CVE-2026-0394

EUVD-2026-16559
When dovecot has been configured to use per-domain passwd files, and they are placed one path component above /etc, or slash has been added to allowed characters, path traversal can happen if the domain component is directory partial. This allows inadvertently reading /etc/passwd (or some other path which ends with passwd). If this file contains passwords, it can be used to authenticate wrongly, or if this is userdb, it can unexpectly make system users appear valid users.  Upgrade to fixed version, or use different authentication scheme that does not rely on paths. Alternatively you can also ensure that the per-domain passwd files are in some other location, such as /etc/dovecot/auth/%d. No publicly available exploits are known.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 19%
Affected Products (NVD)
VendorProductVersion
dovecotdovecot
𝑥
< 2.4.0
open-xchangedovecot
𝑥
< 3.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dovecot
bookworm
vulnerable
bookworm (security)
1:2.3.19.1+dfsg1-2.1+deb12u4
fixed
bullseye
vulnerable
bullseye (security)
1:2.3.13+dfsg1-2+deb11u3
fixed
forky
1:2.4.3+dfsg1-2
fixed
sid
1:2.4.3+dfsg1-2
fixed
trixie
1:2.4.1+dfsg1-6+deb13u3
fixed
trixie (security)
1:2.4.1+dfsg1-6+deb13u4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dovecot
bionic
needed
focal
needed
jammy
Fixed 1:2.3.16+dfsg1-3ubuntu2.7
released
noble
Fixed 1:2.3.21+dfsg1-2ubuntu6.3
released
questing
not-affected
resolute
not-affected
trusty
needed
xenial
needed