4.3
CVSSv2

CVE-2020-13965

Published: 09/06/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue exists in Roundcube Webmail prior to 1.3.12 and 1.4.x prior to 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

roundcube webmail

debian debian linux 9.0

debian debian linux 10.0

fedoraproject fedora 31

fedoraproject fedora 32

Vendor Advisories

Matei Badanoiu and LoRexxar@knownsec discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, did not correctly process and sanitize requests This would allow a remote attacker to perform a Cross-Side Scripting (XSS) attack leading to the execution of arbitrary code For the oldstable distribution (stretch), these probl ...

Github Repositories

CVE-2020-13965: Cross-Site Scripting via Malicious XML Attachment in Roundcube Webmail

CVE-2020-13965: Cross-Site Scripting via Malicious XML Attachment in Roundcube Webmail A Cross-Site scripting (XSS) vulnerability exists in Roundcube versions before 145 and 1312 By leveraging the parsing of "text/xml" attachment, an attacker can bypass the Roundcube script filter and execute arbitrary malicious JavaScript in the victim's browser when the ma