{"api_version":"1","generated_at":"2026-04-23T06:20:02+00:00","cve":"CVE-2025-59032","urls":{"html":"https://cve.report/CVE-2025-59032","api":"https://cve.report/api/cve/CVE-2025-59032.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-59032","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-59032"},"summary":{"title":"CVE-2025-59032","description":"ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response. This can be used to crash ManageSieve service repeatedly, making it unavailable for other users. Control access to ManageSieve port, or disable the service if it's not needed. Alternatively upgrade to a fixed version. No publicly available exploits are known.","state":"PUBLISHED","assigner":"OX","published_at":"2026-03-27 09:16:18","updated_at":"2026-03-30 13:26:29"},"problem_types":["CWE-20","CWE-20 Improper Input Validation"],"metrics":[{"version":"3.1","source":"security@open-xchange.com","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"url":"https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json","name":"https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json","refsource":"security@open-xchange.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-59032","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-59032","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Open-Xchange GmbH","product":"OX Dovecot Pro","version":"affected 3.1.0 semver","platforms":[]},{"source":"CNA","vendor":"Open-Xchange GmbH","product":"OX Dovecot Pro","version":"affected 2.4.0 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2025","cve_id":"59032","cve":"CVE-2025-59032","epss":"0.000700000","percentile":"0.212840000","score_date":"2026-04-06","updated_at":"2026-04-07 00:04:51"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-59032","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-27T19:41:50.066744Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-27T19:42:05.292Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","modules":["core"],"product":"OX Dovecot Pro","vendor":"Open-Xchange GmbH","versions":[{"lessThanOrEqual":"3.1.0","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"2.4.0","status":"affected","version":"0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response. This can be used to crash ManageSieve service repeatedly, making it unavailable for other users. Control access to ManageSieve port, or disable the service if it's not needed. Alternatively upgrade to a fixed version. No publicly available exploits are known."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"Improper Input Validation","lang":"en","type":"cwe"}]}],"providerMetadata":{"dateUpdated":"2026-03-27T12:33:22.354Z","orgId":"8ce71d90-2354-404b-a86e-bec2cc4e6981","shortName":"OX"},"references":[{"tags":["vendor-advisory"],"url":"https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json"}],"source":{"defect":"DOV-8508","discovery":"INTERNAL"}}},"cveMetadata":{"assignerOrgId":"8ce71d90-2354-404b-a86e-bec2cc4e6981","assignerShortName":"OX","cveId":"CVE-2025-59032","datePublished":"2026-03-27T08:10:16.612Z","dateReserved":"2025-09-08T14:22:28.105Z","dateUpdated":"2026-03-27T19:42:05.292Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-27 09:16:18","lastModifiedDate":"2026-03-30 13:26:29","problem_types":["CWE-20","CWE-20 Improper Input Validation"],"metrics":{"cvssMetricV31":[{"source":"security@open-xchange.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"59032","Ordinal":"1","Title":"CVE-2025-59032","CVE":"CVE-2025-59032","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"59032","Ordinal":"1","NoteData":"ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response. This can be used to crash ManageSieve service repeatedly, making it unavailable for other users. Control access to ManageSieve port, or disable the service if it's not needed. Alternatively upgrade to a fixed version. No publicly available exploits are known.","Type":"Description","Title":"CVE-2025-59032"}]}}}