CVE-2025-30189: Improper Preservation of Consistency Between Independent Representations of Shared State in Open-Xchange GmbH OX Dovecot Pro
When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.
AI Analysis
Technical Summary
CVE-2025-30189 is a vulnerability affecting Open-Xchange GmbH's OX Dovecot Pro mail server software. The issue arises when caching is enabled for passdb/userdb drivers, which are responsible for user authentication and database lookups. Due to improper preservation of consistency between independent representations of shared state, multiple users are cached under the same cache key. This causes the system to serve cached login information of one user to others, effectively allowing subsequent logins to be authenticated as the same user. This flaw can lead to unauthorized access, as users may gain access to another user's mailbox or data without proper credentials. The vulnerability does not require any privileges or user interaction to exploit, but the attack complexity is high, likely due to the need to trigger specific caching conditions. The impact affects confidentiality and integrity, as unauthorized access compromises sensitive information and allows potential data manipulation. Availability is not impacted. No public exploits are currently known, but the vulnerability is rated with a CVSS 3.1 score of 7.4 (high severity). Mitigation options include installing a fixed version of OX Dovecot Pro or disabling caching either globally or specifically for the affected passdb/userdb drivers to prevent incorrect caching behavior.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of email communications and stored data. Organizations relying on OX Dovecot Pro for mail services may experience unauthorized access incidents where attackers or legitimate users could gain access to other users' mailboxes, leading to data breaches, leakage of sensitive information, and potential compliance violations under GDPR. The flaw could undermine trust in organizational email infrastructure and cause operational disruptions due to investigation and remediation efforts. Since availability is not affected, service disruption is unlikely, but the breach of confidentiality and integrity can have severe reputational and legal consequences. Organizations in sectors such as finance, government, healthcare, and critical infrastructure in Europe, where secure email communication is essential, are particularly vulnerable. The lack of public exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits in the future.
Mitigation Recommendations
European organizations should prioritize upgrading to the fixed version of OX Dovecot Pro as soon as it becomes available from Open-Xchange GmbH. Until patches are applied, administrators should disable caching globally or at least for the impacted passdb/userdb drivers to prevent the incorrect caching behavior. It is critical to audit current caching configurations and verify that no shared cache keys are used across different users. Implement strict access controls and monitoring on mail server authentication logs to detect anomalous login patterns that may indicate exploitation attempts. Additionally, organizations should conduct internal penetration testing and vulnerability assessments focused on authentication mechanisms in OX Dovecot Pro deployments. Regularly review and update incident response plans to address potential unauthorized access incidents. Finally, ensure that all user credentials are managed securely and consider multi-factor authentication to add an additional layer of protection.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland
CVE-2025-30189: Improper Preservation of Consistency Between Independent Representations of Shared State in Open-Xchange GmbH OX Dovecot Pro
Description
When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.
AI-Powered Analysis
Technical Analysis
CVE-2025-30189 is a vulnerability affecting Open-Xchange GmbH's OX Dovecot Pro mail server software. The issue arises when caching is enabled for passdb/userdb drivers, which are responsible for user authentication and database lookups. Due to improper preservation of consistency between independent representations of shared state, multiple users are cached under the same cache key. This causes the system to serve cached login information of one user to others, effectively allowing subsequent logins to be authenticated as the same user. This flaw can lead to unauthorized access, as users may gain access to another user's mailbox or data without proper credentials. The vulnerability does not require any privileges or user interaction to exploit, but the attack complexity is high, likely due to the need to trigger specific caching conditions. The impact affects confidentiality and integrity, as unauthorized access compromises sensitive information and allows potential data manipulation. Availability is not impacted. No public exploits are currently known, but the vulnerability is rated with a CVSS 3.1 score of 7.4 (high severity). Mitigation options include installing a fixed version of OX Dovecot Pro or disabling caching either globally or specifically for the affected passdb/userdb drivers to prevent incorrect caching behavior.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of email communications and stored data. Organizations relying on OX Dovecot Pro for mail services may experience unauthorized access incidents where attackers or legitimate users could gain access to other users' mailboxes, leading to data breaches, leakage of sensitive information, and potential compliance violations under GDPR. The flaw could undermine trust in organizational email infrastructure and cause operational disruptions due to investigation and remediation efforts. Since availability is not affected, service disruption is unlikely, but the breach of confidentiality and integrity can have severe reputational and legal consequences. Organizations in sectors such as finance, government, healthcare, and critical infrastructure in Europe, where secure email communication is essential, are particularly vulnerable. The lack of public exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits in the future.
Mitigation Recommendations
European organizations should prioritize upgrading to the fixed version of OX Dovecot Pro as soon as it becomes available from Open-Xchange GmbH. Until patches are applied, administrators should disable caching globally or at least for the impacted passdb/userdb drivers to prevent the incorrect caching behavior. It is critical to audit current caching configurations and verify that no shared cache keys are used across different users. Implement strict access controls and monitoring on mail server authentication logs to detect anomalous login patterns that may indicate exploitation attempts. Additionally, organizations should conduct internal penetration testing and vulnerability assessments focused on authentication mechanisms in OX Dovecot Pro deployments. Regularly review and update incident response plans to address potential unauthorized access incidents. Finally, ensure that all user credentials are managed securely and consider multi-factor authentication to add an additional layer of protection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- OX
- Date Reserved
- 2025-03-18T08:39:46.884Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69048024189d660333d32ad2
Added to database: 10/31/2025, 9:23:48 AM
Last enriched: 10/31/2025, 9:38:38 AM
Last updated: 10/31/2025, 4:09:44 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-57108: n/a
HighCVE-2025-63468: n/a
UnknownCVE-2025-63466: n/a
UnknownCVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers
HighCVE-2025-12552: CWE-521 Weak Password Requirements in Azure Access Technology BLU-IC2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.