9.3
CVSSv3

CVE-2024-42009

CVSSv4: NA | CVSSv3: 9.3 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.72898 | KEV: Exploitation Reported
Published: 05/08/2024 Updated: 13/03/2025

Vulnerability Summary

Cross-Site Scripting in Roundcube Leads to Email Theft

A Cross-Site Scripting vulnerability in Roundcube up to and including 1.5.7 and 1.6.x up to and including 1.6.7 allows a remote malicious user to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

roundcube webmail

Vendor Advisories

Debian Bug report logs - #1077969 roundcube: CVE-2024-42008, CVE-2024-42009, CVE-2024-42010: XSS and information leak vulnerabilities Package: src:roundcube; Maintainer for src:roundcube is Debian Roundcube Maintainers <pkg-roundcube-maintainers@alioth-listsdebiannet>; Reported by: Guilhem Moulin <guilhem@debianorg> ...

Mailing Lists

Not associated with Roundcube but didn't see posts about this yet On August 4, the Roundcube project released versions 168 and 158 (LTS) of their webmail client with fixes for several XSS vulnerabilities in HTML e-mail display From the announcement page at <roundcubenet/news/2024/08/04/security-updates-168-and-158>: F ...

Github Repositories

This script exploits a stored XSS vulnerability (CVE-2024-42009) in Roundcube Webmail version 1.6.7. It injects a malicious payload into the webmail system, which, when triggered, exfiltrates email content from the victim’s inbox.

XSS Exploit for Roundcube Webmail 167 (CVE-2024-42009) Description This script exploits a stored XSS vulnerability (CVE-2024-42009) in Roundcube Webmail version 167 It injects a malicious payload into the webmail system, which, when triggered, exfiltrates email content from the victim’s inbox Features Uses a Python HTTP listener to capture and decode stolen email c

The scripts in this repository are made to abuse CVE-2024-42008 and CVE-2024-42009. Both of these CVEs are vulnerabilities found on Roundcube 1.6.7

CVE-2024-42008-9-exploit The scripts in this repository are made to abuse CVE-2024-42008 and CVE-2024-42009 Both of these CVEs are vulnerabilities found on Roundcube 167 Read more about these CVEs and how they can be exploited in the following link: wwwsonarsourcecom/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/

This Proof of Concept (PoC) demonstrates an exploit for CVE-2024-42009, leveraging a cross-site scripting (XSS) vulnerability to extract emails from a target webmail application. The attack injects a malicious payload that exfiltrates email content to an attacker-controlled listener.

CVE-2024-42009 PoC: Email Capture Listener & XSS Exploit Overview This Proof of Concept (PoC) demonstrates an exploit for CVE-2024-42009, leveraging a cross-site scripting (XSS) vulnerability to extract emails from a target webmail application The attack injects a malicious payload that exfiltrates email content to an attacker-controlled listener Features Exploits an

This script exploits a stored XSS vulnerability (CVE-2024-42009) in Roundcube Webmail version 1.6.7. It injects a malicious payload into the webmail system, which, when triggered, exfiltrates email content from the victim’s inbox.

XSS Exploit for Roundcube Webmail 167 (CVE-2024-42009) Description This script exploits a stored XSS vulnerability (CVE-2024-42009) in Roundcube Webmail version 167 It injects a malicious payload into the webmail system, which, when triggered, exfiltrates email content from the victim’s inbox Features Uses a Python HTTP listener to capture and decode stolen email c

CVE-2024-42009 Proof of Concept

CVE-2024-42009 PoC: Roundcube Webmail XSS Email Exfiltration Exploit Overview This repository contains a proof-of-concept (PoC) exploit for CVE-2024-42009 a stored Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail version 167 and other several versions The exploit demonstrates how an attacker can inject malicious JavaScript in a message and take advantage of a de