⚠ Actively exploited
Added to CISA KEV on 2023-06-22. Federal agencies required to patch by 2023-07-13. Required action: Apply updates per vendor instructions..

CVE-2020-12641

9.8
CVSS
CRITICAL
EPSS93.1%(100th)
CISA KEVPublic ExploitExploited in Wild
CISA Required Action: Apply updates per vendor instructions.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

NVDroundcube/webmail1.2.01.2.10+2
Debianroundcube< 1.4.4+dfsg.1-1+3
n/an/an/a
NVDopensuse/leap15.1, 15.2+1
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

🔴Vulnerability Details

4
GHSA
GHSA-q9jx-pp2v-v8xh: rcube_image2022-05-24
CVEList
CVE-2020-12641: rcube_image2020-05-04
OSV
CVE-2020-12641: rcube_image2020-05-04
VulnCheck
Roundcube Webmail Remote Code Execution Vulnerability2020

💥Exploits & PoCs

1
Nuclei
Roundcube Webmail - Command Injection

📋Vendor Advisories

3
CISA
Roundcube Webmail Remote Code Execution Vulnerability2023-06-22
Ubuntu
Roundcube Webmail vulnerabilities2022-08-08
Debian
CVE-2020-12641: roundcube - rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute ar...2020
CVE-2020-12641 (CRITICAL CVSS 9.8) | rcube_image.php in Roundcube Webmai | cvebase.io