View Issue Details

IDProjectCategoryView StatusLast Update
0006195SOGoBackend Mailpublic2026-04-23 10:44
ReporterDavid Assigned To 
PrioritynormalSeverityminorReproducibilityalways
Status newResolutionopen 
Platform[Server] LinuxOSRHEL/CentOSOS Version7
Product Version5.12.6 
Summary0006195: SOGoMailCustomFromEnabled = NO not enforced server-side
Description

The configuration option
SOGoMailCustomFromEnabled = NO
only disables the From field in the SOGo web UI It does not enforce any server-side validation on the /send endpoint. As a result, any authenticated user can bypass the restriction by directly POSTing to the draft send API with a modified from field in the JSON body, without needing any special tools beyond a browser's built-in DevTools.

Steps To Reproduce
  • Set SOGoMailCustomFromEnabled = NO in sogo.conf and restart SOGo
  • Log in as any user via the web interface
  • Compose an email and click Send — capture the POST request using browser DevTools (Network tab)
  • Right-click the request → Copy as fetch
  • Paste into browser Console, modify the from field in the body to any arbitrary address
  • Execute — email is delivered with the spoofed From address, HTTP 200 returned
Additional Information

When
SOGoMailCustomFromEnabled=NO
the server should validate that the submitted from value matches the authenticated user's address and reject the request if it does not.
Now users can impersonate other addresses, including potentially other users on the same domain.

TagsNo tags attached.

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2026-04-23 10:44 David New Issue