Dovecot has provided a script to use for attachment to text conversion. This script unsafely handles zip-style attachments. Attacker can use specially crafted OOXML documents to cause unintended files on the system to be indexed and subsequently ending up in FTS indexes. Do not use the provided script, instead, use something else like FTS tika. No publicly available exploits are known.
References
| Link | Resource |
|---|---|
| https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Apr 2026, 19:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:* cpe:2.3:a:open-xchange:dovecot:*:*:*:*:pro:*:*:* |
|
| First Time |
Open-xchange
Open-xchange dovecot Dovecot Dovecot dovecot |
|
| References | () https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.jsonĀ - Vendor Advisory |
27 Mar 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 09:16
Updated : 2026-04-29 19:13
NVD link : CVE-2025-59031
Mitre link : CVE-2025-59031
CVE.ORG link : CVE-2025-59031
JSON object : View
Products Affected
open-xchange
- dovecot
dovecot
- dovecot
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
