CVE-2026-8851: SOGo SQL Injection Vulnerability in ACL Management
SOGo 5.12.7 is vulnerable to SQL injection in the Access Control List management functionality, allowing authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint, which can be exfiltrated via the /acls API.
SOGo version 5.12.7 is susceptible to a SQL injection vulnerability within its Access Control List (ACL) management feature. Authenticated users can exploit this flaw by injecting malicious SQL subqueries via the uid parameter in the addUserInAcls endpoint. Successful exploitation allows attackers to extract arbitrary data from the database. The injected SQL code can be crafted to write the extracted data into the sogo_acl table. Attackers can then retrieve this data through the /acls API, effectively creating an out-of-band data exfiltration channel. This vulnerability, identified as CVE-2026-8851, poses a significant risk to organizations using vulnerable versions of SOGo.
Attack Chain
- An attacker authenticates to the SOGo application.
- The attacker crafts a malicious HTTP request to the
addUserInAclsendpoint. - The request includes a SQL injection payload within the
uidparameter. - The SOGo application processes the request without proper sanitization, executing the injected SQL code.
- The injected SQL code extracts sensitive data from the database and writes it into the
sogo_acltable. - The attacker sends a request to the
/aclsAPI endpoint. - The SOGo application retrieves the data from the
sogo_acltable. - The attacker receives the extracted data, achieving out-of-band data exfiltration.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2026-8851) allows attackers to extract arbitrary data from the SOGo database. This could include sensitive user information, credentials, and other confidential data. The CVSS v3.1 base score is 8.1, reflecting the high potential for data breach and compromise of the SOGo application and its underlying database.
Recommendation
- Upgrade SOGo to a patched version beyond 5.12.7 to remediate CVE-2026-8851.
- Deploy the Sigma rule
Detect SOGo addUserInAcls SQL Injectionto detect potential exploitation attempts against theaddUserInAclsendpoint. - Monitor web server logs for suspicious requests to the
/aclsAPI after unusual activity on theaddUserInAclsendpoint, as this is the exfiltration point. - Implement input validation and sanitization on the
uidparameter of theaddUserInAclsendpoint if patching is not immediately feasible.
Detection coverage 2
Detect SOGo addUserInAcls SQL Injection
highDetects SQL injection attempts in the addUserInAcls endpoint by looking for SQL syntax in the uid parameter.
Detect SOGo Data Exfiltration via acls API
mediumDetects potential data exfiltration by monitoring requests to the `/acls` endpoint after detecting SQL injection attempts in addUserInAcls
Detection queries are available on the platform. Get full rules →