First published: Mon Oct 16 2023(Updated: )
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
Credit: security@eset.com security@eset.com security@eset.com
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube email server | =1.4.14 | |
Roundcube email server | =1.5.x before 1.5.4 | |
Roundcube email server | =1.6.x before 1.6.3 | |
debian/roundcube | <=1.6.3+dfsg-1~deb12u1<=1.4.14+dfsg.1-1~deb11u1<=1.6.3+dfsg-2<=1.3.17+dfsg.1-1~deb10u3 | 1.6.4+dfsg-1 1.6.4+dfsg-1~deb12u1 1.4.15+dfsg.1-1~deb11u1 |
Roundcube Webmail | ||
Roundcube Webmail | <1.4.15 | |
Roundcube Webmail | >=1.5.0<1.5.5 | |
Roundcube Webmail | >=1.6.0<1.6.4 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Fedoraproject Fedora | =39 | |
debian/roundcube | 1.4.15+dfsg.1-1+deb11u4 1.6.5+dfsg-1+deb12u4 1.6.9+dfsg-2 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this Roundcube vulnerability is CVE-2023-5631.
The severity of CVE-2023-5631 is high with a severity value of 6.1.
CVE-2023-5631 allows stored XSS through an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior.
Roundcube versions before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 are affected by CVE-2023-5631.
To fix CVE-2023-5631, upgrade to Roundcube version 1.4.15, 1.5.5, or 1.6.4.