First published: Fri Nov 19 2021(Updated: )
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to XSS in handling an attachment's filename extension when displaying a MIME type warning message.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | <1.3.17 | |
Roundcube Webmail | >=1.4.0<1.4.12 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/roundcube | 1.3.17+dfsg.1-1~deb10u2 1.3.17+dfsg.1-1~deb10u3 1.4.14+dfsg.1-1~deb11u1 1.4.13+dfsg.1-1~deb11u1 1.6.3+dfsg-1~deb12u1 1.6.4+dfsg-1 | |
<1.3.17 | ||
>=1.4.0<1.4.12 | ||
=33 | ||
=34 | ||
=9.0 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44025 is a vulnerability in Roundcube Webmail before version 1.3.17 and 1.4.x before version 1.4.12 that allows for cross-site scripting (XSS) attacks.
CVE-2021-44025 has a severity score of 6.1, making it a medium-level vulnerability.
CVE-2021-44025 occurs when Roundcube Webmail fails to properly handle an attachment's filename extension, leading to potential XSS attacks when displaying a MIME type warning message.
CVE-2021-44025 affects Roundcube Webmail versions prior to 1.3.17 and versions 1.4.0 to 1.4.12.
To mitigate CVE-2021-44025, it is recommended to update Roundcube Webmail to version 1.3.17 or higher for versions prior to 1.4.0, and to version 1.4.12 or higher for versions 1.4.0 to 1.4.12.