Impact
Roundcube Webmail permits users to submit IMAP SEARCH commands with arguments that are not properly sanitized. A crafted search query can inject additional IMAP instructions or allow an attacker to bypass CSRF protections during a mail search, which may expose private messages or compromise the authenticated session. The vulnerability is a form of injection that could be used to manipulate the mailbox or access data not intended for the user.
Affected Systems
The flaw exists in all Roundcube releases prior to 1.5.14 and 1.6.14. Administrators should upgrade to the latest available releases—1.5.14, 1.6.14, 1.7‑rc5, or the current stable version—to eliminate the risk.
Risk and Exploitability
The assigned CVSS score of 3.1 indicates low severity, and no EPSS data is available. The vulnerability is not listed in the CISA KEV catalog. Exploitation likely involves forging IMAP SEARCH requests, possibly under an authenticated user, and does not require elevated privileges. The attack path is straightforward, so prompt patching is recommended to mitigate potential data exposure or CSRF bypass.
OpenCVE Enrichment
Github GHSA