Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <aZwNSZDGJM_qKMb3@donburi.himad.notcom.org>
Date: Mon, 23 Feb 2026 17:28:14 +0900
From: Valtteri Vuorikoski <vuori@...com.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-26079/CVE-2026-25916: Roundcube vulns prior to 1.5.13/1.6.13

Roundcube, a PHP-based webmail frontend, released a series of security updates
on Feb 8, again with little fanfare. From the release announcement:

 * Fix CSS injection vulnerability reported by CERT Polska.

 * Fix remote image blocking bypass via SVG content reported by nullcathedral.

There are fixed in the newly-released versions 1.5.13 and 1.6.13. While not
mentioned in the official annoucement, these appear to be CVE-2026-26079 (4.7)
and CVE-2026-25916 (4.3) respectively.

Full announcement:
https://roundcube.net/news/2026/02/08/security-updates-1.6.13-and-1.5.13

 -Valtteri

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.