CVE-2026-24031

NameCVE-2026-24031
DescriptionDovecot SQL based authentication can be bypassed when auth_username_chars is cleared by admin. This vulnerability allows bypassing authentication for any user and user enumeration. Do not clear auth_username_chars. If this is not possible, install latest fixed version. No publicly available exploits are known.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dovecot (PTS)bullseye1:2.3.13+dfsg1-2+deb11u1vulnerable
bullseye (security)1:2.3.13+dfsg1-2+deb11u2vulnerable
bookworm, bookworm (security)1:2.3.19.1+dfsg1-2.1+deb12u1vulnerable
trixie1:2.4.1+dfsg1-6+deb13u3vulnerable
trixie (security)1:2.4.1+dfsg1-6+deb13u1vulnerable
forky, sid1:2.4.2+dfsg1-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dovecotsource(unstable)(unfixed)

Notes

https://documentation.open-xchange.com/dovecot/security/advisories/html/2026/oxdc-adv-2026-0001.html#cve-2026-24031-v2-4-v3-1-regression-sql-injection-allows-bypassing-authentication

Search for package or bug name: Reporting problems