Roundcube Webmail 1.6.x < 1.6.3 Cross-Site-Scripting

medium Web App Scanning Plugin ID 114553

Synopsis

Roundcube Webmail 1.6.x < 1.6.3 Cross-Site-Scripting

Description

According to its self-reported version number, Roundcube Webmail is prior to 1.4.14 or 1.5.x prior to 1.5.4 or 1.6.x prior to 1.6.3. Therefore, it may be affected by a Cross-Site Scripting (XSS) vulnerability via text/plain e-mail messages with crafted links.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Roundcube Webmail version 1.6.3 or later.

See Also

https://roundcube.net/news/2023/09/15/security-update-1.6.3-released

Plugin Details

Severity: Medium

ID: 114553

Type: remote

Published: 1/17/2025

Updated: 1/17/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 4.6

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2023-43770

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS Score Source: CVE-2023-43770

Vulnerability Information

CPE: cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/15/2023

Vulnerability Publication Date: 9/15/2023

CISA Known Exploited Vulnerability Due Dates: 3/4/2024

Reference Information

CVE: CVE-2023-43770