CVE-2024-30270

6.2 MEDIUM
Published: April 04, 2024 Modified: October 06, 2025

Description

mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://mailcow.email/posts/2024/release-2024-04
Source: security-advisories@github.com
Release Notes
https://www.sonarsource.com/blog/remote-code-execution-in-mailcow-always-sanitize-error-messages
Source: security-advisories@github.com
Exploit Third Party Advisory
https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-4m8r-87gc-3vvp
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://mailcow.email/posts/2024/release-2024-04
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://www.vicarius.io/vsociety/posts/mailcow-with-xss-and-path-traversal-cve-2024-31204-and-cve-2024-30270
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.2 / 10.0
EPSS (Exploit Probability)
49.4%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mailcow