Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 1 Nov 2023 13:35:16 +0200
From: Kapetanakis Giannis <>
Subject: Re: CVE-2023-5631: XSS vulnerability in Roundcube

Versions up to 1.6.3 - not 1.6.4 - are vulnerable.

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.


On 31/10/2023 23:26, Valtteri Vuorikoski wrote:
> Not associated with the project or ESET, but didn't see anything here about
> this yet.
> Roundcube is an open-source webmail client. Versions up to 1.6.4 are
> vulnerable (including the 1.4.x and 1.5.x series) to an XSS exploit
> caused by an issue in the sanitization of SVG image elements in HTML
> emails. ESET describes CVE-2023-5631 as follows in their press release
> at <>:
>   By sending a specially crafted email message, attackers are able to
>   load arbitrary JavaScript code in the context of the Roundcube user’s
>   browser window. No manual interaction other than viewing the message
>   in a web browser is required. The final JavaScript payload can
>   exfiltrate email messages to the command and control server of the
>   group.
> The Roundcube project has released new versions for each of the abovementioned
> release series. The official release notification is at
> <>.
> According to ESET, the vulnerability is being actively exploited to
> target "governmental entities in Europe".
>  -Valtteri

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.