steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.
{ "versions": [ { "introduced": "0" }, { "fixed": "1.3.8" } ] }
[ { "events": [ { "introduced": "0" }, { "last_affected": "9.0" } ] } ]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19206.json"