Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcubepluginapi.php.
{
    "severity": "Critical",
    "cpes": [
        "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*"
    ]
}