Roundcube Vulnerabilities: Critical Score, File Manipulation, XSS
Summary
CERT-Bund has issued a security advisory for Roundcube, a PHP-based open-source webmail system. Multiple vulnerabilities with a critical CVSS base score of 10.0 have been identified, allowing attackers to manipulate files, bypass security measures, and perform cross-site scripting attacks.
What changed
This advisory from CERT-Bund details critical vulnerabilities in Roundcube versions prior to 1.5.14, 1.6.14, and 1.7-rc5. The vulnerabilities, rated with a critical CVSS base score of 10.0, enable remote attackers to manipulate files, bypass security controls, execute cross-site scripting (XSS) attacks, and disclose information. The advisory applies to Roundcube installations on Linux, UNIX, and Windows operating systems.
Organizations using affected versions of Roundcube must take immediate action to mitigate these risks. Mitigation is available, and users are strongly advised to update to patched versions as soon as possible to prevent exploitation. Failure to address these vulnerabilities could lead to significant data breaches and system compromise.
What to do next
- Update Roundcube to versions 1.5.14, 1.6.14, or 1.7-rc5 or later.
- Review system logs for any signs of exploitation.
- Implement available mitigation strategies if immediate patching is not possible.
Source document (simplified)
[WID-SEC-2026-0789] Roundcube: Mehrere Schwachstellen CVSS Base Score 10.0 (kritisch) CVSS Temporal Score 8.7 (hoch) Remoteangriff ja Datum 18.03.2026 Stand 19.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Roundcube ist ein Open-Source Webmailsystem, basierend auf PHP.
Produkte
18.03.2026
- Open Source Roundcube <1.5.14
Open Source Roundcube <1.6.14
Open Source Roundcube <1.7-rc5
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Roundcube ausnutzen, um Dateien zu manipulieren, um Sicherheitsvorkehrungen zu umgehen, um einen Cross-Site Scripting Angriff durchzuführen, und um Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.