CVE-2025-59031
Publication date 27 March 2026
Last updated 27 March 2026
Ubuntu priority
Description
decode2text.sh OOXML extraction may follow symlinks and read unintended files during indexing. Dovecot has provided a script to use for attachment to text conversion. This script unsafely handles zip-style attachments. Attacker can use specially crafted OOXML documents to cause unintended files on the system to be indexed and subsequently ending up in FTS indexes. No publicly available exploits are known.
Read the notes from the security team
Why is this CVE low priority?
The affected script is shipped as an example
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| dovecot | 25.10 questing |
Vulnerable
|
| 24.04 LTS noble |
Vulnerable
|
|
| 22.04 LTS jammy |
Vulnerable
|
|
| 20.04 LTS focal |
Vulnerable
|
|
| 18.04 LTS bionic |
Vulnerable
|
|
| 16.04 LTS xenial |
Vulnerable
|
|
| 14.04 LTS trusty |
Vulnerable
|
Notes
ebarretto
in trusty and xenial the script is available in: /usr/lib/dovecot/decode2text.sh for bionic and further it is available in: /usr/share/doc/dovecot-core/examples/