⚠ Actively exploited
Added to CISA KEV on 2023-10-26. Federal agencies required to patch by 2023-11-16. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2023-5631 — Cross-site Scripting in Roundcubemail
Severity
5.4MEDIUMNVD
CNA6.1OSV6.1VulnCheck6.1
EPSS
83.4%
top 0.72%
CISA KEV
KEV
Added 2023-10-26
Due 2023-11-16
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedOct 18
KEV addedOct 26
KEV dueNov 16
Latest updateFeb 23
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker
to load arbitrary JavaScript code.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7
Affected Packages2 packages
Also affects: Debian Linux 10.0, 11.0, 12.0, Fedora 39