An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkrefaddindex in rcubestring_replacer.php.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "1.2.13"
},
{
"introduced": "1.3.0"
},
{
"fixed": "1.3.16"
},
{
"introduced": "1.4"
},
{
"fixed": "1.4.10"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "32"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "33"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35730.json"