DEBIAN-CVE-2026-35541

Source
https://security-tracker.debian.org/tracker/CVE-2026-35541
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35541.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-35541
Upstream
  • CVE-2026-35541
Published
2026-04-03T05:16:22.283Z
Modified
2026-04-04T21:00:32.143169Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Incorrect password comparison in the password plugin could lead to type confusion that allows a password change without knowing the old password.

References

Affected packages

Debian:11 / roundcube

Package

Name
roundcube
Purl
pkg:deb/debian/roundcube?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.15+dfsg.1-1+deb11u8

Affected versions

1.*
1.4.11+dfsg.1-4
1.4.12+dfsg.1-1~bpo10+1
1.4.12+dfsg.1-1~deb11u1
1.4.13+dfsg.1-1~deb11u1~bpo10+1
1.4.13+dfsg.1-1~deb11u1
1.4.14+dfsg.1-1~deb11u1~bpo10+1
1.4.14+dfsg.1-1~deb11u1
1.4.15+dfsg.1-1~deb11u1~bpo10+1
1.4.15+dfsg.1-1~deb11u1
1.4.15+dfsg.1-1~deb11u2~bpo10+1
1.4.15+dfsg.1-1~deb11u2
1.4.15+dfsg.1-1+deb11u3
1.4.15+dfsg.1-1+deb11u4
1.4.15+dfsg.1-1+deb11u5
1.4.15+dfsg.1-1+deb11u6
1.4.15+dfsg.1-1+deb11u7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35541.json"

Debian:12 / roundcube

Package

Name
roundcube
Purl
pkg:deb/debian/roundcube?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.5+dfsg-1+deb12u8

Affected versions

1.*
1.6.1+dfsg-1
1.6.2+dfsg-1
1.6.3+dfsg-1~deb12u1
1.6.3+dfsg-1
1.6.3+dfsg-2
1.6.4+dfsg-1~deb12u1
1.6.4+dfsg-1
1.6.5+dfsg-1~deb12u1
1.6.5+dfsg-1
1.6.5+dfsg-1+deb12u2
1.6.5+dfsg-1+deb12u3
1.6.5+dfsg-1+deb12u4
1.6.5+dfsg-1+deb12u5
1.6.5+dfsg-1+deb12u6
1.6.5+dfsg-1+deb12u7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35541.json"

Debian:13 / roundcube

Package

Name
roundcube
Purl
pkg:deb/debian/roundcube?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.15+dfsg-0+deb13u1

Affected versions

1.*
1.6.11+dfsg-1
1.6.12+dfsg-0+deb13u1
1.6.12+dfsg-1
1.6.13+dfsg-0+deb13u1
1.6.13+dfsg-1
1.6.14+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35541.json"

Debian:14 / roundcube

Package

Name
roundcube
Purl
pkg:deb/debian/roundcube?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.14+dfsg-1

Affected versions

1.*
1.6.11+dfsg-1
1.6.12+dfsg-1
1.6.13+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-35541.json"