DEBIAN-CVE-2026-3054

Source
https://security-tracker.debian.org/tracker/CVE-2026-3054
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3054.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-3054
Upstream
  • CVE-2026-3054
Published
2026-02-24T03:16:02.977Z
Modified
2026-02-24T11:26:15.957992Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was identified in Alinto SOGo 5.12.3/5.12.4. This impacts an unknown function. The manipulation of the argument hint leads to cross site scripting. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Debian:11 / sogo

Package

Name
sogo
Purl
pkg:deb/debian/sogo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.0.1-4
5.0.1-4+deb11u1
5.0.1-4+deb11u2
5.0.1-4+deb11u3
5.1.0-1
5.1.1-1
5.2.0-1
5.2.0-2
5.2.0-3
5.3.0-1
5.4.0-1
5.5.0-1
5.5.1-1
5.6.0-1
5.7.0-1
5.7.1-1
5.7.1-2
5.7.1-3
5.8.0-1
5.8.2-1
5.8.3-1
5.8.4-1
5.9.0-1
5.9.1-1
5.10.0-1
5.10.0-2
5.10.0-3
5.11.0-1
5.11.0-2
5.11.1-1
5.11.2-1
5.11.2-2
5.11.2-3
5.11.2-4
5.12.0-1
5.12.1-1
5.12.1-2
5.12.1-3
5.12.3-1
5.12.3-2
5.12.4-1
5.12.4-1.1
5.12.4-1.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3054.json"

Debian:12 / sogo

Package

Name
sogo
Purl
pkg:deb/debian/sogo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.8.0-1
5.8.0-2+deb12u1
5.8.0-2+deb12u2
5.8.2-1
5.8.3-1
5.8.4-1
5.9.0-1
5.9.1-1
5.10.0-1
5.10.0-2
5.10.0-3
5.11.0-1
5.11.0-2
5.11.1-1
5.11.2-1
5.11.2-2
5.11.2-3
5.11.2-4
5.12.0-1
5.12.1-1
5.12.1-2
5.12.1-3
5.12.3-1
5.12.3-2
5.12.4-1
5.12.4-1.1
5.12.4-1.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3054.json"

Debian:13 / sogo

Package

Name
sogo
Purl
pkg:deb/debian/sogo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.12.1-3
5.12.1-3+deb13u1
5.12.3-1
5.12.3-2
5.12.4-1
5.12.4-1.1
5.12.4-1.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3054.json"

Debian:14 / sogo

Package

Name
sogo
Purl
pkg:deb/debian/sogo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.12.1-3
5.12.3-1
5.12.3-2
5.12.4-1
5.12.4-1.1
5.12.4-1.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3054.json"