8.8
CWE
352
Advisory Published
Updated

CVE-2016-4069: CSRF

First published: Thu Aug 25 2016(Updated: )

Cross-site request forgery (CSRF) vulnerability in Roundcube Webmail before 1.1.5 allows remote attackers to hijack the authentication of users for requests that download attachments and cause a denial of service (disk consumption) via unspecified vectors.

Credit: security@debian.org

Affected SoftwareAffected VersionHow to fix
SUSE Linux=42.1
barnraiser AROUNDMe<=1.1.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-4069?

    CVE-2016-4069 is classified as a moderate severity vulnerability due to its potential for causing denial of service and unauthorized actions on behalf of users.

  • How do I fix CVE-2016-4069?

    To fix CVE-2016-4069, you should upgrade to Roundcube Webmail version 1.1.5 or later, as this version addresses the CSRF vulnerability.

  • What systems are affected by CVE-2016-4069?

    CVE-2016-4069 affects Roundcube Webmail versions up to 1.1.4 and openSUSE Leap 42.1 installations.

  • Can CVE-2016-4069 lead to data exposure?

    While CVE-2016-4069 primarily can result in denial of service, it does pose a risk of unauthorized actions which could lead to inadvertent data exposure.

  • What is cross-site request forgery (CSRF) in relation to CVE-2016-4069?

    In the context of CVE-2016-4069, CSRF allows attackers to exploit authenticated sessions to perform actions without the user's consent.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203