CVE-2026-41113 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: April 16, 2026
sagredo qmail - Remote Code Execution
Published: April 16, 2026Updated: April 16, 2026Remote Exploitable
Overview
sagredo qmail < 2026.04.07 contains a remote code execution caused by use of popen in notlshosts_auto in qmail-remote.c, letting remote attackers execute arbitrary code, exploit requires network access.
Severity & Score
Severity: High
CVSS Score: 8.1
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Update to version 2026.04.07 or later.
References
- https://blog.calif.io/p/we-asked-claude-to-audit-sagredos
- https://github.com/califio/publications/tree/main/MADBugs/qmail
- https://github.com/sagredo-dev/qmail/commit/749f607f6885e3d01b36f2647d7a1db88f1ef741
- https://github.com/sagredo-dev/qmail/pull/42
- https://github.com/sagredo-dev/qmail/releases/tag/v2026.04.07
Related Resources
Details
- CVE ID
- CVE-2026-41113
- Severity
- High
- CVSS Score
- 8.1
- Type
- command_injection
- Status
- new
CWE
- CWE-78
CVSS Metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H