CVE-2025-26794

7.5 HIGH
Published: February 21, 2025 Modified: December 18, 2025

Description

Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-limit configurations.)

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1237424
Source: cve@mitre.org
Issue Tracking Third Party Advisory
https://exim.org
Source: cve@mitre.org
Product
https://github.com/Exim/exim/wiki/EximSecurity
Source: cve@mitre.org
Vendor Advisory
https://github.com/NixOS/nixpkgs/pull/383926
Source: cve@mitre.org
Release Notes
http://www.openwall.com/lists/oss-security/2025/02/19/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2025/02/21/4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2025/02/21/5
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory

11 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
72.1%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

exim