CVE-2020-15562

MEDIUM

Roundcube Webmail < 1.2.11 - XSS

Title source: rule
STIX 2.1

Description

An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.

References (6)

Core 6
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/roundcube/roundcubemail/releases/tag/1.4.7
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/roundcube/roundcubemail/releases/tag/1.3.14
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/roundcube/roundcubemail/releases/tag/1.2.11
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2020/dsa-4720

Scores

CVSS v3 6.1
EPSS 0.0086
EPSS Percentile 75.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (2)
debian/debian_linux 10.0
roundcube/webmail < 1.2.11
Published Jul 06, 2020
Tracked Since Feb 18, 2026