An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
https://www.helpnetsecurity.com/2024/08/07/cve-2024-42009-cve-2024-42008/
https://securityaffairs.com/155420/apt/apt8-exploited-outlook-0day-target-nato.html
https://thehackernews.com/2023/10/nation-state-hackers-exploiting-zero.html
https://www.alexbirnberg.com/roundcube-xss.html
https://roundcube.net/download/
https://github.com/roundcube/roundcubemail/releases/tag/1.4.10
https://github.com/roundcube/roundcubemail/releases/tag/1.3.16
https://github.com/roundcube/roundcubemail/releases/tag/1.2.13
https://github.com/roundcube/roundcubemail/compare/1.4.9...1.4.10