rcubeimage.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for imconvertpath or imidentify_path.
{ "cpes": [ "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*" ], "severity": "Critical" }