cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*

CVE-2023-43770

Known exploited
Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.
Max CVSS
6.1
EPSS Score
10.55%
Published
2023-09-22
Updated
2024-02-13
CISA KEV Added
2024-02-12

CVE-2023-5631

Known exploited
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
Max CVSS
6.1
EPSS Score
0.68%
Published
2023-10-18
Updated
2023-12-22
CISA KEV Added
2023-10-26

CVE-2021-44026

Known exploited
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.
Max CVSS
9.8
EPSS Score
0.59%
Published
2021-11-19
Updated
2021-12-16
CISA KEV Added
2023-06-22
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to XSS in handling an attachment's filename extension when displaying a MIME type warning message.
Max CVSS
6.1
EPSS Score
0.13%
Published
2021-11-19
Updated
2021-12-16
Roundcube before 1.4.11 allows XSS via crafted Cascading Style Sheets (CSS) token sequences during HTML email rendering.
Max CVSS
5.4
EPSS Score
0.10%
Published
2021-02-09
Updated
2022-03-10

CVE-2020-35730

Known exploited
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
Max CVSS
6.1
EPSS Score
0.61%
Published
2020-12-28
Updated
2022-04-24
CISA KEV Added
2023-06-22
Cross Site Scripting (XSS) vulnerability in Roundcube Mail <=1.4.4 via smtp config in /installer/test.php.
Max CVSS
5.4
EPSS Score
0.12%
Published
2021-06-24
Updated
2022-03-10
Roundcube Webmail before 1.3.15 and 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document. This issue has been fixed in 1.4.8 and 1.3.15.
Max CVSS
6.1
EPSS Score
0.12%
Published
2020-08-12
Updated
2023-01-20
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.
Max CVSS
6.1
EPSS Score
0.67%
Published
2020-07-06
Updated
2023-01-20
An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.
Max CVSS
6.1
EPSS Score
0.34%
Published
2020-06-09
Updated
2020-07-23
An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. include/rcmail_output_html.php allows XSS via the username template object.
Max CVSS
6.1
EPSS Score
5.60%
Published
2020-06-09
Updated
2023-03-03
An issue was discovered in Roundcube Webmail before 1.4.4. A CSRF attack can cause an authenticated user to be logged out because POST was not considered.
Max CVSS
6.5
EPSS Score
3.06%
Published
2020-05-04
Updated
2022-09-02
An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.
Max CVSS
6.1
EPSS Score
0.50%
Published
2020-05-04
Updated
2022-09-02
Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.
Max CVSS
7.4
EPSS Score
0.12%
Published
2019-08-20
Updated
2023-03-08
In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
Max CVSS
4.3
EPSS Score
0.26%
Published
2019-04-07
Updated
2022-05-03
roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.
Max CVSS
7.5
EPSS Score
0.60%
Published
2018-03-13
Updated
2019-10-03
steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.
Max CVSS
6.1
EPSS Score
67.61%
Published
2018-11-12
Updated
2022-03-10
Roundcube before 1.3.7 mishandles GnuPG MDC integrity-protection warnings, which makes it easier for attackers to obtain sensitive information, a related issue to CVE-2017-17688. This is associated with plugins/enigma/lib/enigma_driver_gnupg.php.
Max CVSS
7.5
EPSS Score
0.23%
Published
2018-11-12
Updated
2022-03-10

CVE-2017-16651

Known exploited
Public exploit
Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.
Max CVSS
7.8
EPSS Score
1.48%
Published
2017-11-09
Updated
2021-03-04
CISA KEV Added
2021-11-03
Roundcube Webmail allows arbitrary password resets by authenticated users. This affects versions before 1.0.11, 1.1.x before 1.1.9, and 1.2.x before 1.2.5. The problem is caused by an improperly restricted exec call in the virtualmin and sasl drivers of the password plugin.
Max CVSS
8.8
EPSS Score
0.34%
Published
2017-04-29
Updated
2022-09-27
rcube_utils.php in Roundcube before 1.1.8 and 1.2.x before 1.2.4 is susceptible to a cross-site scripting vulnerability via a crafted Cascading Style Sheets (CSS) token sequence within an SVG element.
Max CVSS
6.1
EPSS Score
0.21%
Published
2017-03-12
Updated
2018-10-30
steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line, which allows remote authenticated users to execute arbitrary code via a modified HTTP request that sends a crafted e-mail message.
Max CVSS
7.5
EPSS Score
0.68%
Published
2016-12-08
Updated
2017-07-01
Cross-site request forgery (CSRF) vulnerability in Roundcube Webmail before 1.1.5 allows remote attackers to hijack the authentication of users for requests that download attachments and cause a denial of service (disk consumption) via unspecified vectors.
Max CVSS
8.8
EPSS Score
11.24%
Published
2016-08-25
Updated
2018-10-30
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.0.9 and 1.1.x before 1.1.5 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG, a different vulnerability than CVE-2015-8864.
Max CVSS
6.1
EPSS Score
0.17%
Published
2017-04-13
Updated
2018-10-30
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.0.9 and 1.1.x before 1.1.5 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG, a different vulnerability than CVE-2016-4068.
Max CVSS
6.1
EPSS Score
0.17%
Published
2017-04-13
Updated
2018-10-30
45 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!