Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcubepluginapi.php.
{ "cpes": [ "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*" ], "severity": "Critical" }