CVE-2023-5631

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-5631
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-5631.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-5631
Aliases
Downstream
Related
Published
2023-10-18T15:15:08Z
Modified
2025-11-01T06:19:41.418138Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker

to load arbitrary JavaScript code.

References

Affected packages

Git / github.com/roundcube/roundcubemail

Affected ranges

Type
GIT
Repo
https://github.com/roundcube/roundcubemail
Events

Affected versions

1.*

1.1-beta
1.1-rc
1.1.0
1.2-beta
1.2-rc
1.3-beta
1.4-beta
1.4-rc1
1.4-rc2
1.4.0
1.4.1
1.4.10
1.4.11
1.4.12
1.4.13
1.4.14
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.4.8
1.4.9
1.5-beta
1.5-rc
1.5.0
1.5.1
1.5.2
1.5.3
1.5.4
1.6-beta
1.6-rc
1.6.0
1.6.1
1.6.2
1.6.3

v0.*

v0.1-beta2

v1.*

v1.0-beta