CVE-2020-12641
CRITICAL KEV NUCLEIRoundcube Webmail <1.4.4 - RCE
Title source: llmDescription
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
Exploits (2)
Nuclei Templates (1)
Roundcube Webmail - Command Injection
CRITICALVERIFIEDby domwhewell-sage
Shodan:
http.component:"roundcube" || cpe:"cpe:2.3:a:roundcube:webmail"
References (8)
Scores
CVSS v3
9.8
EPSS
0.9313
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2023-06-22
VulnCheck KEV
2023-06-20
InTheWild.io
2023-06-22
ENISA EUVD
EUVD-2020-4942
Classification
CWE
CWE-78
Status
published
Affected Products (5)
roundcube/webmail
< 1.2.10
opensuse/backports_sle
opensuse/backports_sle
opensuse/leap
opensuse/leap
Timeline
Published
May 04, 2020
KEV Added
Jun 22, 2023
Tracked Since
Feb 18, 2026