First published: Fri Oct 20 2023(Updated: )
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows XSS via a text/html e-mail message containing an SVG image with a USE element. This is related to wash_uri in rcube_washtml.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | <1.4.15<1.5.5<1.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46267 has a medium severity rating due to its potential for XSS attacks through specially crafted email messages.
To fix CVE-2023-46267, upgrade to Roundcube versions 1.4.15, 1.5.5, or 1.6.4 or later.
CVE-2023-46267 is an XSS vulnerability that can be exploited via SVG images in email messages.
Affected versions include Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4.
If unable to update, consider implementing content security policies or disabling HTML emails to mitigate risks from CVE-2023-46267.