Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker
to load arbitrary JavaScript code.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
13 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html - Mailing List, Third Party Advisory | |
Summary | (en) Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code. |
27 Jan 2025, 21:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079 - Mailing List, Patch | |
References | () https://github.com/roundcube/roundcubemail/issues/9168 - Exploit, Issue Tracking | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html - Mailing List | |
References | () https://www.debian.org/security/2023/dsa-5531 - Mailing List |
Information
Published : 2023-10-18 15:15
Updated : 2025-03-19 20:57
NVD link : CVE-2023-5631
Mitre link : CVE-2023-5631
CVE.ORG link : CVE-2023-5631
JSON object : View
Products Affected
roundcube
- webmail
debian
- debian_linux
fedoraproject
- fedora
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')