Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
https://www.helpnetsecurity.com/2024/08/07/cve-2024-42009-cve-2024-42008/
https://thehackernews.com/2023/10/nation-state-hackers-exploiting-zero.html
https://www.debian.org/security/2023/dsa-5531
https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15
https://roundcube.net/news/2023/10/16/security-update-1.6.4-released
https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html
https://github.com/roundcube/roundcubemail/releases/tag/1.6.4
https://github.com/roundcube/roundcubemail/releases/tag/1.5.5
https://github.com/roundcube/roundcubemail/releases/tag/1.4.15
https://github.com/roundcube/roundcubemail/issues/9168
https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613
https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079
http://www.openwall.com/lists/oss-security/2023/11/17/2