CVE-2026-40016 — Attacker can upload a malicious Sieve script over

CVE-2026-40016 — Attacker can upload a malicious Sieve script over

CVE-2026-40016 — Attacker can upload a malicious Sieve script over ManageSieve service (or locally) to bypass configured CPU time limits for Sieve up to 130 times of the configured limit. Attacker can use this to degrade server performance and bypass configured CPU time limits for Sieve scripts. Ins

What This Means For You

  • If your environment is affected by CWE-400, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-40016 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

medium T1505.003 Persistence

CVE-2026-40016 - Malicious Sieve Script Upload via ManageSieve

Sigma YAML — free preview
title: CVE-2026-40016 - Malicious Sieve Script Upload via ManageSieve
id: scw-2026-05-12-ai-1
status: experimental
level: medium
description: |
  Detects the upload of a Sieve script via the ManageSieve service that attempts to bypass CPU limits. This rule specifically looks for POST requests to a '/manage-sieve' endpoint containing '.sieve' in the query and a script payload indicative of attempting to execute commands or bypass limits, which is characteristic of CVE-2026-40016.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-40016/
tags:
  - attack.persistence
  - attack.t1505.003
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/manage-sieve'
      cs-method|contains:
          - 'POST'
      sc-status|startswith:
          - '2'
      cs-uri-query|contains:
          - '.sieve'
  selection_script_content:
      TargetFilename|contains:
          - 'require [ "vnd.dovecot.execute"]
          - 'vnd.dovecot.execute "/bin/bash -c "'
      condition: selection AND selection_script_content
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40016 vulnerability CVE-2026-40016
CWE-400 weakness CWE-400
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 12, 2026 at 17:17 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

Ivanti Endpoint Manager RCE via SQL Injection (CVE-2026-8111)

CVE-2026-8111 — SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.

vulnerabilityCVEhigh-severityremote-code-executioncwe-89
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 3 Sigma

Ivanti Endpoint Manager Privilege Escalation (CVE-2026-8110)

CVE-2026-8110 — Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

vulnerabilityCVEhigh-severitycwe-732
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-8109 — An exposed dangerous method on the Core Server of Ivanti

CVE-2026-8109 — An exposed dangerous method on the Core Server of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to leak access credentials.

vulnerabilityCVEmedium-severitycwe-749
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 3 Sigma