Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2012-3508Cross-site Scripting in Webmail

Severity
4.3MEDIUMNVD
EPSS
10.0%
top 6.94%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 25
Latest updateMay 17

Description

Cross-site scripting (XSS) vulnerability in program/lib/washtml.php in Roundcube Webmail 0.8.0 allows remote attackers to inject arbitrary web script or HTML by using "javascript:" in an href attribute in the body of an HTML-formatted email.

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-h9g8-25j6-gxp7: Cross-site scripting (XSS) vulnerability in program/lib/washtml2022-05-17
OSV
CVE-2012-3508: Cross-site scripting (XSS) vulnerability in program/lib/washtml2012-08-25
CVEList
CVE-2012-3508: Cross-site scripting (XSS) vulnerability in program/lib/washtml2012-08-25

💥Exploits & PoCs

1
Exploit-DB
Roundcube Webmail 0.8.0 - Persistent Cross-Site Scripting2012-08-16

📋Vendor Advisories

1
Debian
CVE-2012-3508: roundcube - Cross-site scripting (XSS) vulnerability in program/lib/washtml.php in Roundcube...2012

💬Community

2
Bugzilla
CVE-2012-3508 roundcubemail: XSS by processing signatures in HTML mode2012-08-20
Bugzilla
CVE-2012-3508 roundcubemail: XSS by processing signatures in HTML mode [fedora-all]2012-08-20
CVE-2012-3508 — Cross-site Scripting in Webmail | cvebase