Changeflow GovPing Data Privacy & Cybersecurity Roundcube Vulnerabilities: Critical Score, File...
Urgent Notice Added Final

Roundcube Vulnerabilities: Critical Score, File Manipulation, XSS

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 18th, 2026
Detected March 19th, 2026
Email

Summary

CERT-Bund has issued a security advisory for Roundcube, a PHP-based open-source webmail system. Multiple vulnerabilities with a critical CVSS base score of 10.0 have been identified, allowing attackers to manipulate files, bypass security measures, and perform cross-site scripting attacks.

What changed

This advisory from CERT-Bund details critical vulnerabilities in Roundcube versions prior to 1.5.14, 1.6.14, and 1.7-rc5. The vulnerabilities, rated with a critical CVSS base score of 10.0, enable remote attackers to manipulate files, bypass security controls, execute cross-site scripting (XSS) attacks, and disclose information. The advisory applies to Roundcube installations on Linux, UNIX, and Windows operating systems.

Organizations using affected versions of Roundcube must take immediate action to mitigate these risks. Mitigation is available, and users are strongly advised to update to patched versions as soon as possible to prevent exploitation. Failure to address these vulnerabilities could lead to significant data breaches and system compromise.

What to do next

  1. Update Roundcube to versions 1.5.14, 1.6.14, or 1.7-rc5 or later.
  2. Review system logs for any signs of exploitation.
  3. Implement available mitigation strategies if immediate patching is not possible.

Source document (simplified)

[WID-SEC-2026-0789] Roundcube: Mehrere Schwachstellen CVSS Base Score 10.0 (kritisch) CVSS Temporal Score 8.7 (hoch) Remoteangriff ja Datum 18.03.2026 Stand 19.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Roundcube ist ein Open-Source Webmailsystem, basierend auf PHP.

Produkte

18.03.2026
- Open Source Roundcube <1.5.14

  • Open Source Roundcube <1.6.14

  • Open Source Roundcube <1.7-rc5

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Roundcube ausnutzen, um Dateien zu manipulieren, um Sicherheitsvorkehrungen zu umgehen, um einen Cross-Site Scripting Angriff durchzuführen, und um Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Named provisions

Betroffene Systeme Angriff

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 18th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0789

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Webmail Security Software Patching
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Data Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.