Open Xchange Open Xchange

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Open Xchange product.

RSS Feeds for Open Xchange security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Open Xchange products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Open Xchange Sorted by Most Security Vulnerabilities since 2018

Open Xchange Appsuite80 vulnerabilities

Open Xchange Ox App Suite66 vulnerabilities

Open Xchange Appsuite Backend14 vulnerabilities

Open Xchange Appsuite Office4 vulnerabilities

Open Xchange Documents3 vulnerabilities

Open Xchange Ox Guard3 vulnerabilities

Open Xchange App Suite1 vulnerability

Open Xchange Office Web1 vulnerability

By the Year

In 2026 there have been 0 vulnerabilities in Open Xchange. Last year, in 2025 Open Xchange had 7 security vulnerabilities published. Right now, Open Xchange is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 7 6.09
2024 23 6.43
2023 47 5.70
2022 23 6.37
2021 37 6.02
2020 14 5.87
2019 14 6.51
2018 8 6.20

It may take a day or so for new Open Xchange vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Open Xchange Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2025-59026 Nov 27, 2025
File Upload XSS: Malicious Content Triggers Script Execution in User Context Malicious content uploaded as file can be used to execute script code when following attacker-controlled links. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the provided updates and patch releases. No publicly available exploits are known
Ox App Suite
CVE-2025-59025 Nov 27, 2025
Email XSS: Malicious Script Execution via Sanitization Bypass Malicious e-mail content can be used to execute script code. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Sanitization has been updated to avoid such bypasses. No publicly available exploits are known
Ox App Suite
CVE-2025-30190 Nov 27, 2025
Office Doc Scripting Injection Vulnerability (CVE-2025-30190) Malicious content at office documents can be used to inject script code when editing a document. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the provided updates and patch releases. No publicly available exploits are known
Ox App Suite
CVE-2025-30186 Nov 27, 2025
CVE-2025-30186: File Upload XSS Causing Script Execution Malicious content uploaded as file can be used to execute script code when following attacker-controlled links. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the provided updates and patch releases. No publicly available exploits are known
Ox App Suite
CVE-2025-30189 Oct 31, 2025
Linux PAM Passdb/Userdb Drivers Use Same Cache Key User Hijacking When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.
CVE-2025-30191 Oct 31, 2025
Unknown: EMail Redirection Attack via Malicious Content Malicious content from E-Mail can be used to perform a redressing attack. Users can be tricked to perform unintended actions or provide sensitive information to a third party which would enable further threats. Attribute values containing HTML fragments are now denied by the sanitization procedure. No publicly available exploits are known
Ox App Suite
CVE-2025-30188 Oct 31, 2025
Unknown: API-induced Cache Eviction DoS via Unbounded Data Addition Malicious or unintentional API requests can be used to add significant amount of data to caches. Caches may evict information that is required to operate the web frontend, which leads to unavailability of the component. Please deploy the provided updates and patch releases. No publicly available exploits are known
Ox App Suite
CVE-2024-23185 Sep 10, 2024
Dovecot Message-Parser DoS via Large Headers Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up "full_value" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn't matter whether it's a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot's vsz_limit. So attackers probably can't DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known.
Ox Dovecot Pro
CVE-2024-23184 Sep 10, 2024
Dovecot DoS via Large Address Header Parsing Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.
CVE-2024-25582 Aug 19, 2024
Remote Code Injection via Module Savepoints in Unknown Web CMS Module savepoints could be abused to inject references to malicious code delivered through the same domain. Attackers could perform malicious API requests or extract information from the users account. Exploiting this vulnerability requires temporary access to an account or successful social engineering to make a user follow a prepared link to a malicious account. Please deploy the provided updates and patch releases. The savepoint module path has been restricted to modules that provide the feature, excluding any arbitrary or non-existing modules. No publicly available exploits are known.
Ox App Suite
CVE-2024-4367 May 14, 2024
PDF.js missing type check -> arbitrary JS exec in Firefox/TB <126/115 A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Open Xchange Appsuite Frontend
CVE-2024-23186 May 06, 2024
Apple Mail XSS via Malicious Email Display-Name (CVE-2024-23186) E-Mail containing malicious display-name information could trigger client-side script execution when using specific mobile devices. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. We now use safer methods of handling external content when embedding displayname information to the web interface. No publicly available exploits are known.
Ox App Suite
CVE-2024-23187 May 06, 2024
Outlook CIDBased Email Script Injection via Show More Content-ID based embedding of resources in E-Mails could be abused to trigger client-side script code when using the "show more" option. Attackers could perform malicious API requests or extract information from the users account. Exploiting the vulnerability requires user interaction. Please deploy the provided updates and patch releases. CID replacement has been hardened to omit invalid identifiers. No publicly available exploits are known.
Ox App Suite
CVE-2024-23193 May 06, 2024
Cross-User PDF Cache Disclosure in E-Mails Export E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until caches were cleared. Successful exploitation requires good timing and modification of multiple request parameters. Please deploy the provided updates and patch releases. The cache for PDF exports now takes user session information into consideration when performing authorization decisions. No publicly available exploits are known.
Ox App Suite
CVE-2024-23192 Apr 08, 2024
RSS Feed data- Attribute Injection Vulnerability RSS feeds that contain malicious data- attributes could be abused to inject script code to a users browser session when reading compromised RSS feeds or successfully luring users to compromised accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Potentially malicious attributes now get removed from external RSS content. No publicly available exploits are known.
Ox App Suite
CVE-2024-23191 Apr 08, 2024
Stored XSS via upsell ad content in user accounts Upsell advertisement information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to lure users to maliciously configured accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-defined upsell content has been improved. No publicly available exploits are known.
Ox App Suite
CVE-2024-23190 Apr 08, 2024
Upsell Component XSS: Manipulated Content Executes Script in Browser Upsell shop information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to lure users to maliciously configured accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-defined upsell content has been improved. No publicly available exploits are known.
Ox App Suite
CVE-2024-23189 Apr 08, 2024
Jira XSS via Embedded Content in Tasks Embedded content references at tasks could be used to temporarily execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to the users account, access to another account within the same context or an successful social engineering attack to make users import external content. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-generated content has been improved. No publicly available exploits are known.
Ox App Suite
CVE-2023-41703 Feb 12, 2024
CVE-2023-41703: Confluence XSS via Unescaped User Mentions User ID references at mentions in document comments were not correctly sanitized. Script code could be injected to a users session when working with a malicious document. Please deploy the provided updates and patch releases. User-defined content like comments and mentions are now filtered to avoid potentially malicious content. No publicly available exploits are known.
Open Xchange Appsuite
Ox App Suite
CVE-2023-41704 Feb 12, 2024
Microsoft Outlook XSS via CID reference in EMail (CVE202341704) Processing of CID references at E-Mail can be abused to inject malicious script code that passes the sanitization engine. Malicious script code could be injected to a users sessions when interacting with E-Mails. Please deploy the provided updates and patch releases. CID handing has been improved and resulting content is checked for malicious content. No publicly available exploits are known.
Open Xchange Appsuite
Ox App Suite
CVE-2023-41705 Feb 12, 2024
OX App Suite: Unrestricted DAV User-Agent Strings Causing DoS Processing of user-defined DAV user-agent strings is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of DAV user-agents now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known.
Open Xchange Appsuite
Ox App Suite
CVE-2023-41706 Feb 12, 2024
DoS via Unbounded Drive Search Expressions in OX App Suite Processing time of drive search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing of user-defined drive search expressions is not limited No publicly available exploits are known.
Open Xchange Appsuite
Ox App Suite
CVE-2023-41708 Feb 12, 2024
CVE-2023-41708: App Loader redirect flaw enabling JS injection References to the "app loader" functionality could contain redirects to unexpected locations. Attackers could forge app references that bypass existing safeguards to inject malicious script code. Please deploy the provided updates and patch releases. References to apps are now controlled more strict to avoid relative references. No publicly available exploits are known.
Open Xchange Appsuite
Ox App Suite
CVE-2023-41707 Feb 12, 2024
DoS via Unlimited Mail Search Expressions in OX App Suite Processing of user-defined mail search expressions is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of mail search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known.
Open Xchange Appsuite Frontend
Open Xchange Appsuite Backend
Open Xchange Office Web
And others...
CVE-2023-29051 Jan 08, 2024
OX App Suite: OXMF Template Feature Exposes Limited Internal Java API Access User-defined OXMF templates could be used to access a limited part of the internal OX App Suite Java API. The existing switch to disable the feature by default was not effective in this case. Unauthorized users could discover and modify application state, including objects related to other users and contexts. We now make sure that the switch to disable user-generated templates by default works as intended and will remove the feature in future generations of the product. No publicly available exploits are known.
Ox App Suite
CVE-2023-29048 Jan 08, 2024
OpenXchange OXMF Template Engine RCE via System Command Injection A component for parsing OXMF templates could be abused to execute arbitrary system commands that would be executed as the non-privileged runtime user. Users and attackers could run system commands with limited privilege to gain unauthorized access to confidential information and potentially violate integrity by modifying resources. The template engine has been reconfigured to deny execution of harmful commands on a system level. No publicly available exploits are known.
Ox App Suite
CVE-2023-29049 Jan 08, 2024
XSS via 'upsell' widget on portal page for code execution The "upsell" widget at the portal page could be abused to inject arbitrary script code. Attackers that manage to lure users to a compromised account, or gain temporary access to a legitimate account, could inject script code to gain persistent code execution capabilities under a trusted domain. User input for this widget is now sanitized to avoid malicious content the be processed. No publicly available exploits are known.
Ox App Suite
CVE-2023-29050 Jan 08, 2024
LDAP Filter Injection via LDAP Contacts Provider in Microsoft Skype for Business The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
Ox App Suite
CVE-2023-29052 Jan 08, 2024
XSS via Unsanitized Disclaimer Text in Upsell Shop Dialog Users were able to define disclaimer texts for an upsell shop dialog that would contain script code that was not sanitized correctly. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.
Ox App Suite
CVE-2023-41710 Jan 08, 2024
Shopify: Unsanitized user script injection via upsell URL User-defined script code could be stored for a upsell related shop URL. This code was not correctly sanitized when adding it to DOM. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.
Ox App Suite
CVE-2023-29047 Nov 02, 2023
Imageconverter API SQLi: Unsanitized Input Allows Arbitrary SQL Execution Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-29046 Nov 02, 2023
Microsoft Outlook AutoDiscover timeout leaks leading to network exhaustion Connections to external data sources, like e-mail autoconfiguration, were not terminated in case they hit a timeout, instead those connections were logged. Some connections use user-controlled endpoints, which could be malicious and attempt to keep the connection open for an extended period of time. As a result users were able to trigger large amount of egress network connections, possibly exhausting network pool resources and lock up legitimate requests. A new mechanism has been introduced to cancel external connections that might access user-controlled endpoints. No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-29045 Nov 02, 2023
Script injection via malformed drawing operations in collaborative docs Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-29044 Nov 02, 2023
Script Injection via Document Collaboration Ops Documents operations could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now get escaped to avoid code execution. No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-29043 Nov 02, 2023
Microsoft PowerPoint: Image Ref XSS via Malicious Scripts Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editing a document. Script code embedded in malicious documents could be executed in the context of the user editing the document when performing certain actions, like copying content. The relevant attribute does now get encoded to avoid the possibility of executing script code. No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-26455 Nov 02, 2023
Chronos RMI Service Auth Bypass in setEventOrganizer RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-26456 Nov 02, 2023
XSS via Unsanitized Product Name in OX Guard UI Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.
Ox Guard
CVE-2023-26452 Nov 02, 2023
SQLi in imageconverter Service Requests to cache an image and return its metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-26454 Nov 02, 2023
ImageConverter Service: SQLi via Metadata Fetch Requests to fetch image metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-26453 Nov 02, 2023
SQL Injection via Cached Image Requests in ImageConverter Service Requests to cache an image could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.
Open Xchange Appsuite
CVE-2023-26445 Aug 02, 2023
JSLOB Theme Exploit: XSS & Session Hijack via Frontend Themes Frontend themes are defined by user-controllable jslob settings and could point to a malicious resource which gets processed during login. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the theme value and use a default fallback if no theme matches. No publicly available exploits are known.
Open Xchange Appsuite Frontend
CVE-2023-26449 Aug 02, 2023
CVE-2023-26449 OX Chat Media-Type Mismatch Enables XSS & Session Hijack The "OX Chat" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.
Open Xchange Appsuite Frontend
CVE-2023-26448 Aug 02, 2023
Unsanitized Custom Log-In URL Allows XSS (CVE-2023-26448) Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No publicly available exploits are known.
Open Xchange Appsuite Frontend
CVE-2023-26451 Aug 02, 2023
OAuth Auth Service Predictable Token Flaw Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.
Open Xchange Appsuite Backend
CVE-2023-26450 Aug 02, 2023
Open-Xchange OX Count Missing Media-Type XSS & Session Hijack The "OX Count" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.
Open Xchange Appsuite Frontend
CVE-2023-26447 Aug 02, 2023
CVE-2023-26447: XSS in Portal Upsell Widget via unescaped jslob The "upsell" widget for the portal allows to specify a product description. This description taken from a user-controllable jslob did not get escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content. No publicly available exploits are known.
Open Xchange Appsuite Frontend
CVE-2023-26446 Aug 02, 2023
WordPress XSS via unsanitized clientID in Application Passwords The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known.
Open Xchange Appsuite Frontend
CVE-2023-26440 Aug 02, 2023
SQLi via Cache Service API unsafe parameter handling The cacheservice API could be abused to indirectly inject parameters with SQL syntax which was insufficiently sanitized and would later be executed when creating new cache groups. Attackers with access to a local or restricted network could perform arbitrary SQL queries. We have improved the input check for API calls and filter for potentially malicious content. No publicly available exploits are known.
Open Xchange Appsuite Office
CVE-2023-26441 Aug 02, 2023
Cacheservice Path Traversal Access to Arbitrary Local Files Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.
Open Xchange Appsuite Office
CVE-2023-26438 Aug 02, 2023
JDK DNS Cache TOCTOU Bypass Deny Lists External service lookups for a number of protocols were vulnerable to a time-of-check/time-of-use (TOCTOU) weakness, involving the JDK DNS cache. Attackers that were timing DNS cache expiry correctly were able to inject configuration that would bypass existing network deny-lists. Attackers could exploit this weakness to discover the existence of restricted network infrastructure and service availability. Improvements were made to include deny-lists not only during the check of the provided connection data, but also during use. No publicly available exploits are known.
Open Xchange Appsuite Backend
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.