Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-50340 PoC — SOGo Webmail 安全漏洞

Source
Associated Vulnerability
Title:SOGo Webmail 安全漏洞 (CVE-2025-50340)
Description:SOGo Webmail是SOGo开源的一个网页邮件和协作系统。 SOGo Webmail 5.6.0及之前版本存在安全漏洞,该漏洞源于不安全的直接对象引用,可能导致经过身份验证的用户冒充其他用户发送邮件。
Description
Insecure Direct Object Reference (IDOR vulnerability) in SOGo Webmail Allows a user to send emails on behalf of  another user. 
Readme
# CVE-2025-50340: Insecure Direct Object Reference (IDOR vulnerability) in SOGo Webmail

CVE ID: CVE-2025-50340  
Reporter: Milad Seddigh  
Product: SOGo  
Affected Versions: v5.6.0  
Impact: Insecure Direct Object Reference (IDOR vulnerability) → Allows the user to send emails on behalf of another user. 

## Summary

An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail, allowing an 
authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email
sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender 
identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or 
unauthorized communication within the system. 

## Steps to Reproduce

1- Login to your account. 
2- Send an email and intercept your request using Burp Suite. 
3- Change the “from” parameter to victim’s email address to send on behalf of victim. 
4- The response server shows the success in sending the email on behalf of another user. 

## Mitigation

Enforce Proper Authorization:
Implement strict server-side authorization checks to ensure that users can only perform actions on resources they are explicitly authorized to access.
Verify that the authenticated user is the rightful owner of the email identity being used as the sender (from address).
File Snapshot

[4.0K] /data/pocs/57cdfcb1f50edded9b94a1784605aa4bfd8252cd ├── [1.4K] CVE-2025-50340 └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.