Changeflow GovPing Data Privacy & Cybersecurity CERT-FR: Multiple vulnerabilities in Roundcube ...
Priority review Notice Added Final

CERT-FR: Multiple vulnerabilities in Roundcube software

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published March 19th, 2026
Detected March 19th, 2026
Email

Summary

CERT-FR has issued an advisory regarding multiple vulnerabilities discovered in Roundcube webmail software. The vulnerabilities could lead to data confidentiality breaches, server-side request forgery (SSRF), and remote code injection (XSS). Users are advised to consult the editor's security bulletin for patch information.

What changed

CERT-FR, the French national cybersecurity agency, has published an advisory (CERTFR-2026-AVI-0320) detailing multiple critical vulnerabilities found in various versions of Roundcube webmail software. The identified risks include data confidentiality breaches, security policy bypass, server-side request forgery (SSRF), cross-site scripting (XSS), and cross-site request forgery (CSRF). Affected versions include 1.5.x prior to 1.5.14, 1.6.x prior to 1.6.14, and 1.7.x prior to 1.7-rc5.

Organizations using affected Roundcube versions must immediately consult the Roundcube security bulletin and apply the necessary patches to mitigate these risks. Failure to do so could result in significant data breaches and compromise the integrity of their systems. The advisory directs users to the editor's security updates for specific patch details and implementation guidance.

What to do next

  1. Consult the Roundcube security bulletin for patch information.
  2. Apply security updates to affected Roundcube versions (1.5.x, 1.6.x, 1.7.x) promptly.

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 19 mars 2026 N° CERTFR-2026-AVI-0320 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans Roundcube

Gestion du document

| Référence | CERTFR-2026-AVI-0320 |
| Titre | Multiples vulnérabilités dans Roundcube |
| Date de la première version | 19 mars 2026 |
| Date de la dernière version | 19 mars 2026 |
| Source(s) | Bulletin de sécurité Roundcube security-updates-1.7-rc5-1.6.14-1.5.16 du 18 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Atteinte à la confidentialité des données
  • Contournement de la politique de sécurité
  • Falsification de requêtes côté serveur (SSRF)
  • Injection de code indirecte à distance (XSS)
  • Injection de requêtes illégitimes par rebond (CSRF)

Systèmes affectés

  • Roundcube Webmail versions 1.5.x antérieures à 1.5.14
  • Roundcube Webmail versions 1.6.x antérieures à 1.6.14
  • Roundcube Webmail versions 1.7.x antérieures à 1.7-rc5

Résumé

De multiples vulnérabilités ont été découvertes dans Roundcube. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une falsification de requêtes côté serveur (SSRF) et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 19 mars 2026 Version initiale

Named provisions

Risques Systèmes affectés Résumé Solutions Documentation

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
March 19th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0320

Who this affects

Industry sector
5112 Software & Technology
Activity scope
Webmail Security Software Vulnerability Management
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Data Privacy Information Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.