TROYANOSYVIRUS
Back to CVEs

CVE-2026-27602

HIGH
7.2

Description

Modoboa is a mail hosting and management platform. Prior to version 2.7.1, `exec_cmd()` in `modoboa/lib/sysutils.py` always runs subprocess calls with `shell=True`. Since domain names flow directly into shell command strings without any sanitization, a Reseller or SuperAdmin can include shell metacharacters in a domain name to run arbitrary OS commands on the server. Version 2.7.1 patches the issue.

CVE Details

CVSS v3.1 Score7.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published3/25/2026
Last Modified3/26/2026
Sourcenvd
Honeypot Sightings0

Affected Products

modoboa:modoboa

Weaknesses (CWE)

CWE-78

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.