Description
An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. XSS exists because of insufficient HTML attachment sanitization in preview mode. A victim must preview a text/html attachment.
Published: 2026-04-03
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

Roundcube Webmail versions prior to 1.5.14 and 1.6.14 allow a malicious user to inject JavaScript by delivering an HTML attachment that the webmail interface will preview without proper sanitization. When a victim opens the preview, the embedded script runs in the victim’s browser context, enabling the attacker to steal session cookies, deface the interface, or otherwise compromise the user’s browser session. This weakness maps to CWE‑79, an injection flaw that allows arbitrary client‑side code execution.

Affected Systems

All installations of Roundcube Webmail that are running software versions older than 1.5.14 and 1.6.14 are affected. Users who have not upgraded to the patched releases introduced in the 1.5.14, 1.6.14, or later 1.7‑rc5 releases are at risk. The vulnerability applies to any deployment where the webmail client can render HTML attachments in preview mode.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate severity impact on confidentiality and integrity. The EPSS score of less than 1% suggests that exploitation of this flaw is unlikely to be broadly observed in the wild. The vulnerability is not listed in the CISA KEV catalog, indicating no confirmed active exploits as of the data snapshot. The likely attack vector is client‑side: the attacker must embed malicious content in an email attachment and persuade, or trick, a user to preview the attachment; once the preview is rendered, the script will execute within the victim’s browser.

Generated by OpenCVE AI on April 7, 2026 at 23:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Roundcube Webmail to version 1.5.14, 1.6.14, or a later release such as 1.7‑rc5 or newer from the vendor’s official release channel.
  • If an immediate upgrade is not possible, disable the HTML attachment preview feature in the webmail configuration to prevent rendering of potentially unsafe content.
  • Monitor email traffic for unexpected HTML attachments and block them or warn users about suspicious attachments before previewing.

Generated by OpenCVE AI on April 7, 2026 at 23:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6196-1 roundcube security update
Github GHSA Github GHSA GHSA-x4q5-8j5g-hpjc Roundcube Webmail: Insufficient HTML attachment sanitization in preview mode
History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Cross‑Site Scripting via Previewing HTML Attachments in Roundcube

Tue, 07 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*

Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Cross‑Site Scripting via Previewing HTML Attachments in Roundcube
First Time appeared Roundcube
Roundcube webmail
Vendors & Products Roundcube
Roundcube webmail

Fri, 03 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. XSS exists because of insufficient HTML attachment sanitization in preview mode. A victim must preview a text/html attachment.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Roundcube Webmail
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-03T13:10:55.717Z

Reserved: 2026-04-03T03:39:16.997Z

Link: CVE-2026-35539

cve-icon Vulnrichment

Updated: 2026-04-03T13:10:52.287Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T05:16:21.920

Modified: 2026-04-07T20:53:07.750

Link: CVE-2026-35539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:54:23Z

Weaknesses