Vulnerability Details : CVE-2020-35730

An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
Vulnerability category: Cross site scripting (XSS)
Published 2020-12-28 20:15:13
Updated 2022-04-24 01:55:40
Source MITRE
View at NVD,   CVE.org
CVE-2020-35730 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows an attacker to send a plain text e-mail message with Javascript in a link reference element that is mishandled by linkref_addinindex in rcube_string_replacer.php.
Notes:
https://roundcube.net/news/2020/12/27/security-updates-1.4.10-1.3.16-and-1.2.13
Added on 2023-06-22 Action due date 2023-07-13

Exploit prediction scoring system (EPSS) score for CVE-2020-35730

Probability of exploitation activity in the next 30 days: 0.46%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2020-35730

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
4.3
MEDIUM AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
nvd@nist.gov
6.1
MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2.8
2.7
nvd@nist.gov

CWE ids for CVE-2020-35730

References for CVE-2020-35730

Products affected by CVE-2020-35730

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!