PatchSiren cyber security CVE debrief
CVE-2016-6191 Alinto CVE debrief
CVE-2016-6191 describes multiple cross-site scripting (XSS) vulnerabilities in the View Raw Source page of the SOGo Web Calendar. In affected versions before 3.1.3, attacker-controlled content in the Description, Location, URL, or Title fields could be rendered as arbitrary web script or HTML. The NVD record classifies the issue as medium severity and maps it to CWE-79.
- Vendor
- Alinto
- Product
- CVE-2016-6191
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams running SOGo Web Calendar should pay attention, especially where users can create or view shared calendar entries. Any deployment that still exposes versions before 3.1.3 is in scope.
Technical summary
The vulnerability is an output-encoding / sanitization failure in the Web Calendar’s View Raw Source page. User-supplied calendar fields are reflected into HTML in a way that permits script or markup injection. NVD’s CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network reachability, no privileges required, and user interaction needed for exploitation, with low confidentiality and integrity impact.
Defensive priority
Medium. Upgrade priority is high for any exposed SOGo deployment still on a version earlier than 3.1.3, because the issue is reachable remotely and can affect users who open the affected page.
Recommended defensive actions
- Upgrade SOGo to version 3.1.3 or later.
- Verify that the View Raw Source page correctly encodes or sanitizes the Description, Location, URL, and Title fields before rendering.
- Review any custom themes, templates, or integrations that might bypass upstream output handling.
- Add regression tests for XSS in calendar source views and shared-event rendering paths.
- If immediate upgrade is not possible, limit access to the affected Web Calendar functionality until the patch is deployed.
Evidence notes
The CVE record published by NVD lists affected versions through SOGo 3.1.2 and cites CWE-79. The reference set includes an oss-security mailing list post, a SOGo patch commit, and a vendor advisory, all of which support the remediation history for this issue. The supplied corpus also provides the CVSS 3.1 vector and confirms that the vulnerability requires user interaction.
Official resources
-
CVE-2016-6191 CVE record
CVE.org
-
CVE-2016-6191 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, VDB Entry
-
Mitigation or vendor reference
[email protected] - Patch
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
The CVE record was published on 2017-02-17. The reference list also points to a 2016 oss-security thread, a patch commit, and a vendor advisory, indicating the issue and remediation were discussed before the record publication date.