CVE-2025-50340: n/a
An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail thru 5.6.0, allowing an authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email-sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or unauthorized communication within the system. NOTE: this is disputed by the Supplier because the only effective way to prevent this sender spoofing is on the SMTP server, not within a client such as SOGo.
AI Analysis
Technical Summary
CVE-2025-50340 is an Insecure Direct Object Reference (IDOR) vulnerability identified in SOGo Webmail versions up to 5.6.0. This vulnerability allows an authenticated user to manipulate a user-controlled identifier in the email-sending request to send emails on behalf of other users without proper authorization checks. Specifically, the server does not verify whether the authenticated user is permitted to use the specified sender identity, enabling unauthorized message delivery as another user. This flaw can be exploited to impersonate legitimate users within the system, facilitating phishing attacks, unauthorized communication, and potential social engineering campaigns. The vulnerability is categorized under CWE-639, which relates to authorization bypass through improper validation of user-supplied input. It is important to note that the supplier disputes the vulnerability's impact, arguing that sender spoofing prevention should be enforced at the SMTP server level rather than within the client application like SOGo. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low complexity, and privileges (authenticated user) but does not impact confidentiality or availability, only integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability highlights a design weakness in the SOGo Webmail client’s authorization logic for sender identity verification during email dispatch.
Potential Impact
For European organizations using SOGo Webmail, this vulnerability poses a risk primarily to the integrity of email communications. Attackers with valid user credentials could impersonate other users within the same organization, potentially sending fraudulent emails that appear legitimate. This can facilitate internal phishing campaigns, spread misinformation, or conduct social engineering attacks targeting employees or external partners. The unauthorized use of sender identities undermines trust in organizational communications and could lead to data leakage if sensitive information is requested or disclosed via these spoofed emails. While confidentiality and availability are not directly impacted, the reputational damage and operational disruption caused by successful impersonation attacks can be significant. Organizations in regulated sectors such as finance, healthcare, and government may face compliance risks if such spoofing leads to data breaches or fraud. The medium severity rating suggests that while exploitation requires authenticated access, the potential for lateral movement and escalation within the organization remains a concern.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement multi-layered controls beyond relying solely on the SOGo Webmail client. First, enforce strict SMTP server-side sender verification policies such as SPF, DKIM, and DMARC to detect and block unauthorized sender addresses, as recommended by the supplier. Additionally, implement role-based access controls and restrict user permissions within SOGo to minimize the number of users who can send emails on behalf of others. Regularly audit user activities and monitor email logs for anomalous sending patterns indicative of impersonation attempts. Organizations should also consider deploying email security gateways with advanced anti-spoofing and anomaly detection capabilities. Promptly update SOGo Webmail to the latest version once a patch addressing this vulnerability is released. In the interim, educate users about the risks of phishing and impersonation attacks and encourage verification of unexpected or suspicious emails, especially those requesting sensitive actions or information.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-50340: n/a
Description
An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail thru 5.6.0, allowing an authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email-sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or unauthorized communication within the system. NOTE: this is disputed by the Supplier because the only effective way to prevent this sender spoofing is on the SMTP server, not within a client such as SOGo.
AI-Powered Analysis
Technical Analysis
CVE-2025-50340 is an Insecure Direct Object Reference (IDOR) vulnerability identified in SOGo Webmail versions up to 5.6.0. This vulnerability allows an authenticated user to manipulate a user-controlled identifier in the email-sending request to send emails on behalf of other users without proper authorization checks. Specifically, the server does not verify whether the authenticated user is permitted to use the specified sender identity, enabling unauthorized message delivery as another user. This flaw can be exploited to impersonate legitimate users within the system, facilitating phishing attacks, unauthorized communication, and potential social engineering campaigns. The vulnerability is categorized under CWE-639, which relates to authorization bypass through improper validation of user-supplied input. It is important to note that the supplier disputes the vulnerability's impact, arguing that sender spoofing prevention should be enforced at the SMTP server level rather than within the client application like SOGo. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low complexity, and privileges (authenticated user) but does not impact confidentiality or availability, only integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability highlights a design weakness in the SOGo Webmail client’s authorization logic for sender identity verification during email dispatch.
Potential Impact
For European organizations using SOGo Webmail, this vulnerability poses a risk primarily to the integrity of email communications. Attackers with valid user credentials could impersonate other users within the same organization, potentially sending fraudulent emails that appear legitimate. This can facilitate internal phishing campaigns, spread misinformation, or conduct social engineering attacks targeting employees or external partners. The unauthorized use of sender identities undermines trust in organizational communications and could lead to data leakage if sensitive information is requested or disclosed via these spoofed emails. While confidentiality and availability are not directly impacted, the reputational damage and operational disruption caused by successful impersonation attacks can be significant. Organizations in regulated sectors such as finance, healthcare, and government may face compliance risks if such spoofing leads to data breaches or fraud. The medium severity rating suggests that while exploitation requires authenticated access, the potential for lateral movement and escalation within the organization remains a concern.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement multi-layered controls beyond relying solely on the SOGo Webmail client. First, enforce strict SMTP server-side sender verification policies such as SPF, DKIM, and DMARC to detect and block unauthorized sender addresses, as recommended by the supplier. Additionally, implement role-based access controls and restrict user permissions within SOGo to minimize the number of users who can send emails on behalf of others. Regularly audit user activities and monitor email logs for anomalous sending patterns indicative of impersonation attempts. Organizations should also consider deploying email security gateways with advanced anti-spoofing and anomaly detection capabilities. Promptly update SOGo Webmail to the latest version once a patch addressing this vulnerability is released. In the interim, educate users about the risks of phishing and impersonation attacks and encourage verification of unexpected or suspicious emails, especially those requesting sensitive actions or information.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68911568ad5a09ad00e300c5
Added to database: 8/4/2025, 8:17:44 PM
Last enriched: 8/19/2025, 1:24:12 AM
Last updated: 11/2/2025, 1:48:19 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12603: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12602: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12599: CWE-321 Use of Hard-coded Cryptographic Key in Azure Access Technology BLU-IC2
CriticalCVE-2025-12601: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalCVE-2025-12600: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.