Roundcube Roundcubemail vulnerabilities

11 known vulnerabilities affecting roundcube/roundcubemail.

Total CVEs
11
CISA KEV
2
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL1MEDIUM8LOW2

Vulnerabilities

Page 1 of 1
CVE-2026-35540MEDIUM≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35540 [MEDIUM] CWE-669 Roundcube Webmail: Insufficient CSS sanitization in HTML e-mail messages Roundcube Webmail: Insufficient CSS sanitization in HTML e-mail messages An issue was discovered in Roundcube Webmail 1.6.0 before 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to SSRF or Information Disclosure, e.g., if stylesheet links point to local network hosts.
ghsaosv
CVE-2026-35539MEDIUM≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35539 [MEDIUM] CWE-79 Roundcube Webmail: Insufficient HTML attachment sanitization in preview mode Roundcube Webmail: Insufficient HTML attachment sanitization in preview mode An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. XSS exists because of insufficient HTML attachment sanitization in preview mode. A victim must preview a text/html attachment.
ghsaosv
CVE-2026-35544MEDIUM≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35544 [MEDIUM] CWE-669 Roundcube Webmail: Insufficient CSS sanitization in HTML e-mail messages Roundcube Webmail: Insufficient CSS sanitization in HTML e-mail messages An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to a fixed-position mitigation bypass via the use of !important.
ghsaosv
CVE-2026-35545MEDIUM≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35545 [MEDIUM] CWE-669 Roundcube Webmail: Remote image blocking feature can be bypassed via SVG content in an e-mail message Roundcube Webmail: Remote image blocking feature can be bypassed via SVG content in an e-mail message An issue was discovered in Roundcube Webmail before 1.5.15 and 1.6.15. The remote image blocking feature can be bypassed via SVG content in an e-mail message. This may lead to information disclosure or access-control bypass. This involves the animate element with
ghsaosv
CVE-2026-35543MEDIUM≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35543 [MEDIUM] CWE-669 Roundcube Webmail: Bypass of remote image blocking via SVG content (with animate attributes) in an e-mail message Roundcube Webmail: Bypass of remote image blocking via SVG content (with animate attributes) in an e-mail message An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remote image blocking feature can be bypassed via SVG content (with animate attributes) in an e-mail message. This may lead to information disclosure or access-cont
ghsaosv
CVE-2026-35542MEDIUM≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35542 [MEDIUM] CWE-669 Roundcube: Bypass of remote image blocking via crafted BODY background attribute Roundcube: Bypass of remote image blocking via crafted BODY background attribute An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remote image blocking feature can be bypassed via a crafted background attribute of a BODY element in an e-mail message. This may lead to information disclosure or access-control bypass.
ghsaosv
CVE-2026-35541MEDIUM≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35541 [MEDIUM] CWE-843 Roundcube Webmail: Incorrect password comparison in the password plugin Roundcube Webmail: Incorrect password comparison in the password plugin An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Incorrect password comparison in the password plugin could lead to type confusion that allows a password change without knowing the old password.
ghsaosv
CVE-2026-35537LOW≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35537 [LOW] CWE-502 Roundcube Webmail: Unsafe deserialization in the redis/memcache session handler Roundcube Webmail: Unsafe deserialization in the redis/memcache session handler An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsafe deserialization in the redis/memcache session handler may lead to arbitrary file write operations by unauthenticated attackers via crafted session data.
ghsaosv
CVE-2026-35538LOW≥ 1.7-beta, < 1.7-rc52026-04-03
CVE-2026-35538 [LOW] CWE-88 Roundcube Webmail: Unsanitized IMAP SEARCH command arguments Roundcube Webmail: Unsanitized IMAP SEARCH command arguments An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsanitized IMAP SEARCH command arguments could lead to IMAP injection or CSRF bypass during mail search.
ghsaosv
CVE-2025-49113CRITICALKEVPoC≥ 0, < 1.5.10≥ 1.6.0, < 1.6.112025-06-02
CVE-2025-49113 [CRITICAL] CWE-502 Roundcube Webmail Vulnerable to Authenticated RCE via PHP Object Deserialization Roundcube Webmail Vulnerable to Authenticated RCE via PHP Object Deserialization Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
ghsaosv
CVE-2023-5631MEDIUMCVSS 5.4KEV≥ 1.6.0, < 1.6.3≥ 1.5.0, < 1.5.4+1 more2023-10-18
CVE-2023-5631 [MEDIUM] CWE-79 CVE-2023-5631: Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e- Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
cvelistv5nvd