CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

roundcube

webmail

33 known vulnerabilities · sorted by CVSS score

CVE-2025-49113
CRITICAL9.9

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

roundcube / webmail+2
Network
Published Jun 2, 2025
Page 1 of 2
CVE-2020-12641
CRITICAL9.8

rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

roundcube / webmail+6
Network
Published May 4, 2020
CVE-2021-44026
CRITICAL9.8

Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.

roundcube / webmail+6
Network
Published Nov 19, 2021
CVE-2020-12640
CRITICAL9.8

Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.

roundcube / webmail+6
Network
Published May 4, 2020
CVE-2024-37385
CRITICAL9.8

Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 on Windows allows command injection via im_convert_path and im_identify_path. NOTE: this issue exists because of an incomplete fix for CVE-2020-12641.

roundcube / webmail+1
Network
Published Jun 7, 2024
CVE-2024-42009
CRITICAL9.3

A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.

roundcube / webmail+1
Network
Published Aug 5, 2024
CVE-2024-42008
CRITICAL9.3

A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.

roundcube / webmail+1
Network
Published Aug 5, 2024
CVE-2018-9846
HIGH8.8

In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and later because of a Same Origin Policy protection mechanism.

roundcube / webmail+1
Network
Published Apr 7, 2018
CVE-2018-19205
HIGH7.5

Roundcube before 1.3.7 mishandles GnuPG MDC integrity-protection warnings, which makes it easier for attackers to obtain sensitive information, a related issue to CVE-2017-17688. This is associated with plugins/enigma/lib/enigma_driver_gnupg.php.

roundcube / webmail
Network
Published Nov 12, 2018
CVE-2018-1000071
HIGH7.5

roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.

roundcube / webmail
Network
Published Mar 13, 2018
CVE-2019-15237
HIGH7.4

Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.

roundcube / webmail+1
Network
Published Aug 20, 2019
CVE-2025-68460
HIGH7.2

Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a information disclosure vulnerability in the HTML style sanitizer.

roundcube / webmail+1
Network
Published Dec 18, 2025
CVE-2025-68461
HIGH7.2

Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.

roundcube / webmail+1
Network
Published Dec 18, 2025
CVE-2020-12626
MEDIUM6.5

An issue was discovered in Roundcube Webmail before 1.4.4. A CSRF attack can cause an authenticated user to be logged out because POST was not considered.

roundcube / webmail+2
Network
Published May 4, 2020
CVE-2024-37383
MEDIUM6.1

Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.

roundcube / webmail+2
Network
Published Jun 7, 2024
CVE-2020-13965
MEDIUM6.1

An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.

roundcube / webmail+5
Network
Published Jun 9, 2020
CVE-2018-19206
MEDIUM6.1

steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.

roundcube / webmail+1
Network
Published Nov 12, 2018
CVE-2024-57004
MEDIUM6.1

Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail 1.6.9 allows remote authenticated users to upload a malicious file as an email attachment, leading to the triggering of the XSS by visiting the SENT session.

roundcube / webmail
Network
Published Feb 3, 2025
CVE-2020-35730
MEDIUM6.1

An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.

roundcube / webmail+5
Network
Published Dec 28, 2020
CVE-2023-5631
MEDIUM6.1

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.

roundcube / webmail+6
Network
Published Oct 18, 2023