Description
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.
References (6)
Core 6
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/roundcube/roundcubemail/releases/tag/1.4.7
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/roundcube/roundcubemail/releases/tag/1.3.14
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/roundcube/roundcubemail/releases/tag/1.2.11
Patch, Third Party Advisory x_refsource_misc
https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4720
Broken Link vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html
Scores
CVSS v3
6.1
EPSS
0.0086
EPSS Percentile
75.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (2)
debian/debian_linux
10.0
roundcube/webmail
< 1.2.11
Published
Jul 06, 2020
Tracked Since
Feb 18, 2026