An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail thru 5.6.0, allowing an authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email-sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or unauthorized communication within the system. NOTE: this is disputed by the Supplier because the only effective way to prevent this sender spoofing is on the SMTP server, not within a client such as SOGo.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 15 Aug 2025 18:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail thru 5.6.0, allowing an authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email-sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or unauthorized communication within the system. | An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail thru 5.6.0, allowing an authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email-sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or unauthorized communication within the system. NOTE: this is disputed by the Supplier because the only effective way to prevent this sender spoofing is on the SMTP server, not within a client such as SOGo. | 
| References |  | 
Thu, 07 Aug 2025 07:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Sogo Sogo webmail | |
| Vendors & Products | Sogo Sogo webmail | 
Tue, 05 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-639 | |
| Metrics | cvssV3_1 
 
 | 
Mon, 04 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail thru 5.6.0, allowing an authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email-sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or unauthorized communication within the system. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2025-08-04T00:00:00.000Z
Updated: 2025-08-15T18:27:59.855Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50340
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-05T13:39:35.269Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-08-04T20:15:30.673
Modified: 2025-08-15T19:15:34.013
Link: CVE-2025-50340
 Redhat
                        Redhat
                    No data.