CVE-2026-46446: SOGo SQL Injection Exposes Cleartext Passwords
The National Vulnerability Database has detailed CVE-2026-46446, a high-severity SQL injection vulnerability affecting SOGo before version 5.12.7. This flaw is present when SOGo utilizes PostgreSQL or MariaDB and is configured to store cleartext passwords. The vulnerability stems from improper handling of the c_password parameter in the changePasswordForLogin function, making it susceptible to malicious input.
A successful exploit of this SQL injection, rated with a CVSS score of 7.1 (High), could allow an authenticated attacker with low privileges to execute arbitrary SQL commands. Given the specific conditions—cleartext password storage and the use of PostgreSQL or MariaDB—the impact is significant. An attacker could potentially gain unauthorized access to sensitive user data, including other cleartext passwords, or manipulate the database contents. This isn’t just about password resets; it’s about potential full data exfiltration or integrity compromise.
Defenders must prioritize patching SOGo instances to version 5.12.7 or newer. Beyond patching, this vulnerability highlights a critical architectural flaw: storing cleartext passwords. Even if this specific SQLi is patched, any system still configured this way is a ticking time bomb. Organizations should immediately review their SOGo configurations and database practices to ensure passwords are never stored in cleartext. Hashed and salted passwords are the absolute minimum standard.
What This Means For You
- If your organization uses SOGo with PostgreSQL or MariaDB, and especially if you're still storing cleartext passwords, you are critically exposed. This isn't a theoretical risk; it's a direct path for an attacker to compromise your user base. Patch to SOGo 5.12.7 immediately, and more importantly, audit your password storage practices. Cleartext passwords are an operational catastrophe waiting to happen.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-46446: SOGo SQL Injection Attempt via c_password Parameter
title: CVE-2026-46446: SOGo SQL Injection Attempt via c_password Parameter
id: scw-2026-05-14-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-46446 by looking for the specific SQL injection pattern 'c_password='%@'' within the URI query string targeting SOGo web applications. This vulnerability allows attackers to inject SQL commands, potentially leading to the exposure of cleartext passwords.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-46446/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- "c_password='%@'"
cs-uri|contains:
- "/SOGo/"
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-46446 | SQLi | SOGo before 5.12.7 |
| CVE-2026-46446 | SQLi | Vulnerable when PostgreSQL or MariaDB is used |
| CVE-2026-46446 | SQLi | Vulnerable when cleartext passwords are stored |
| CVE-2026-46446 | SQLi | Related to c_password = '%@' in changePasswordForLogin |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 07:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.