6.1
CVSSv3

CVE-2020-35730

Published: 28/12/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

An XSS issue exists in Roundcube Webmail prior to 1.2.13, 1.3.x prior to 1.3.16, and 1.4.x prior to 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

roundcube webmail

fedoraproject fedora 32

fedoraproject fedora 33

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #978491 roundcube: CVE-2020-35730: XSS vulnerability via malious HTML or plaintext messages Package: src:roundcube; Maintainer for src:roundcube is Debian Roundcube Maintainers <pkg-roundcube-maintainers@alioth-listsdebiannet>; Reported by: Guilhem Moulin <guilhem@debianorg> Date: Mon, 28 D ...
Alex Birnberg discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, is prone to a cross-site scripting vulnerability in handling HTML or Plain text messages with malicious content For the stable distribution (buster), this problem has been fixed in version 1316+dfsg1-1~deb10u1 We recommend that you upgrade your r ...
A security issue was found in Roundcube Webmail before version 1410, 1316 and 1213 linkref_addindex in rcube_string_replacerphp allowed performing a stored cross-site scripting attack using a crafted HTML or plain text email message ...

Github Repositories

A demo exploit for CVE-2021-44026, a SQL injection in Roundcube

Roundcube CVE-2021-44026, a SQL injection This repository contains a demo exploit for an SQL injection in Roundcube Disclaimer: This code is intended solely for educational purposes and to assist security teams in identifying vulnerabilities in their Roundcube instances It should only be used in ethical hacking engagements in which the security professional has written author

Recent Articles

Advanced threat predictions for 2024
Securelist • GReAT • 14 Nov 2023

Advanced persistent threats (APTs) are the most dangerous threats, as they employ complex tools and techniques, and often are highly targeted and hard to detect. Amid the global crisis and escalating geopolitical confrontations, these sophisticated cyberattacks are even more dangerous, as there is often more at stake. At Kaspersky’s Global Research and Analysis Team (GReAT), we monitor a number of APT groups, analyze trends and try to anticipate their future developments to keep ahead of the e...

Pro-Russia group exploits Roundcube zero-day in attacks on European government emails
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources With this zero-day, researchers say the 'scrappy' group is stepping up its operations

The Winter Vivern cyber spy group is exploiting an XSS zero-day vulnerability in attacks on European governments. Researchers at ESET, who discovered the activity, didn't name the specific government entities it targeted but given Winter Vivern's nexus to Russia and Belarus, they are likely to be adversaries of those countries. Tracked as CVE-2023-5631, the zero-day was found in the free and open-source webmail client Roundcube. ESET reported the vulnerability to the Roundcube team on October 12...