rcubeimage.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for imconvertpath or imidentify_path.
{ "urgency": "unimportant" }
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-12641.json"