<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-8851 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-8851/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 21:18:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-8851/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-8851: SOGo SQL Injection Vulnerability in ACL Management</title><link>https://feed.craftedsignal.io/briefs/2026-05-sogo-sql-injection/</link><pubDate>Mon, 18 May 2026 21:18:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sogo-sql-injection/</guid><description>SOGo 5.12.7 is vulnerable to SQL injection in the Access Control List management functionality, allowing authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint, which can be exfiltrated via the /acls API.</description><content:encoded><![CDATA[<p>SOGo version 5.12.7 is susceptible to a SQL injection vulnerability within its Access Control List (ACL) management feature. Authenticated users can exploit this flaw by injecting malicious SQL subqueries via the <code>uid</code> parameter in the <code>addUserInAcls</code> endpoint. Successful exploitation allows attackers to extract arbitrary data from the database. The injected SQL code can be crafted to write the extracted data into the <code>sogo_acl</code> table. Attackers can then retrieve this data through the <code>/acls</code> API, effectively creating an out-of-band data exfiltration channel. This vulnerability, identified as CVE-2026-8851, poses a significant risk to organizations using vulnerable versions of SOGo.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the SOGo application.</li>
<li>The attacker crafts a malicious HTTP request to the <code>addUserInAcls</code> endpoint.</li>
<li>The request includes a SQL injection payload within the <code>uid</code> parameter.</li>
<li>The SOGo application processes the request without proper sanitization, executing the injected SQL code.</li>
<li>The injected SQL code extracts sensitive data from the database and writes it into the <code>sogo_acl</code> table.</li>
<li>The attacker sends a request to the <code>/acls</code> API endpoint.</li>
<li>The SOGo application retrieves the data from the <code>sogo_acl</code> table.</li>
<li>The attacker receives the extracted data, achieving out-of-band data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-8851) allows attackers to extract arbitrary data from the SOGo database. This could include sensitive user information, credentials, and other confidential data. The CVSS v3.1 base score is 8.1, reflecting the high potential for data breach and compromise of the SOGo application and its underlying database.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SOGo to a patched version beyond 5.12.7 to remediate CVE-2026-8851.</li>
<li>Deploy the Sigma rule <code>Detect SOGo addUserInAcls SQL Injection</code> to detect potential exploitation attempts against the <code>addUserInAcls</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests to the <code>/acls</code> API after unusual activity on the <code>addUserInAcls</code> endpoint, as this is the exfiltration point.</li>
<li>Implement input validation and sanitization on the <code>uid</code> parameter of the <code>addUserInAcls</code> endpoint if patching is not immediately feasible.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>cve-2026-8851</category><category>data-exfiltration</category></item></channel></rss>