When sending invalid base64 SASL data, login process is disconnected from the auth server, causing all active authentication sessions to fail. Invalid BASE64 data can be used to DoS a vulnerable server to break concurrent logins. Install fixed version or disable concurrency in login processes (heavy perfomance penalty on large deployments). No publicly available exploits are known.
References
| Link | Resource |
|---|---|
| https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Apr 2026, 17:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.jsonĀ - Vendor Advisory | |
| CPE | cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:* cpe:2.3:a:open-xchange:dovecot:*:*:*:*:pro:*:*:* |
|
| First Time |
Open-xchange
Open-xchange dovecot Dovecot Dovecot dovecot |
|
| CWE | NVD-CWE-noinfo |
27 Mar 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 09:16
Updated : 2026-04-30 17:50
NVD link : CVE-2025-59028
Mitre link : CVE-2025-59028
CVE.ORG link : CVE-2025-59028
JSON object : View
Products Affected
open-xchange
- dovecot
dovecot
- dovecot
CWE
