CVE-2018-9846Improper Input Validation in Webmail

Severity
8.8HIGHNVD
OSV6.1
EPSS
0.9%
top 24.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 7
Latest updateMar 30

Description

In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and later because of a Same Origin Policy protection mechanism.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

Ubunturoundcube/roundcube_webmail< 1.2~beta+dfsg.1-0ubuntu1+esm7+1
NVDroundcube/webmail1.2.01.3.5

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

4
OSV
roundcube vulnerabilities2026-03-30
GHSA
GHSA-3v75-9ch3-wfrw: In Roundcube from versions 12022-05-14
OSV
CVE-2018-9846: In Roundcube from versions 12018-04-07
CVEList
CVE-2018-9846: In Roundcube from versions 12018-04-07

📋Vendor Advisories

2
Ubuntu
Roundcube Webmail vulnerabilities2026-03-30
Debian
CVE-2018-9846: roundcube - In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and c...2018

💬Community

2
Bugzilla
CVE-2018-9846 roundcubemail: MX injection in archive.php [epel-all]2018-04-12
Bugzilla
CVE-2018-9846 roundcubemail: MX injection in archive.php2018-04-12
CVE-2018-9846 — Improper Input Validation in Webmail | cvebase