USN-8223-1

Source
https://ubuntu.com/security/notices/USN-8223-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8223-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8223-1
Upstream
Related
Published
2026-04-29T13:50:15Z
Modified
2026-04-30T10:00:02.772086882Z
Summary
roundcube vulnerabilities
Details

It was discovered that Roundcube Webmail mishandled Punycode xn-- domain names. An attacker could possibly use this issue to cause a homograph attack. (CVE-2019-15237)

It was discovered that Roundcube Webmail did not properly sanitize certain attributes when handling CSS within HTML messages and certain SVG attributes. An attacker could possibly use this issue to cause a cross-site scripting attack. (CVE-2024-38356, CVE-2024-38357)

It was discovered that Roundcube Webmail did not properly sanitize certain HTML attributes when rendering e-mail messages. An attacker could possibly use this issue to cause a cross-site scripting attack. (CVE-2024-42008)

It was discovered that Roundcube Webmail did not properly filter certain CSS token sequences within rendered e-mail messages. An attacker could possibly use this issue to obtain sensitive information. (CVE-2024-42010)

It was discovered that Roundcube Webmail did not properly treat an SVG tag as an image source within its HTML sanitizer. An attacker could possibly use this issue to bypass remote image blocking to track email open actions or potentially bypass access control. (CVE-2026-25916)

It was discovered that Roundcube Webmail did not properly handle comments within Cascading Style Sheets (CSS). An attacker could possibly use this issue to perform a CSS injection attack. (CVE-2026-26079)

References

Affected packages

Ubuntu:Pro:16.04:LTS / roundcube

Package

Name
roundcube
Purl
pkg:deb/ubuntu/roundcube@1.2~beta+dfsg.1-0ubuntu1+esm8?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2~beta+dfsg.1-0ubuntu1+esm8

Affected versions

1.*
1.1.1+dfsg.1-2
1.1.2+dfsg.1-5
1.1.3+dfsg.1-1
1.1.4+dfsg.1-1
1.2~beta+dfsg.1-0ubuntu1
1.2~beta+dfsg.1-0ubuntu1+esm1
1.2~beta+dfsg.1-0ubuntu1+esm2
1.2~beta+dfsg.1-0ubuntu1+esm3
1.2~beta+dfsg.1-0ubuntu1+esm4
1.2~beta+dfsg.1-0ubuntu1+esm5
1.2~beta+dfsg.1-0ubuntu1+esm6
1.2~beta+dfsg.1-0ubuntu1+esm7

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "roundcube",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm8"
        },
        {
            "binary_name": "roundcube-core",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm8"
        },
        {
            "binary_name": "roundcube-mysql",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm8"
        },
        {
            "binary_name": "roundcube-pgsql",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm8"
        },
        {
            "binary_name": "roundcube-plugins",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm8"
        },
        {
            "binary_name": "roundcube-sqlite3",
            "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm8"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2019-15237",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-42010",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26079",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8223-1.json"

Ubuntu:Pro:18.04:LTS / roundcube

Package

Name
roundcube
Purl
pkg:deb/ubuntu/roundcube@1.3.6+dfsg.1-1ubuntu0.1~esm8?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.6+dfsg.1-1ubuntu0.1~esm8

Affected versions

1.*
1.3.0+dfsg.1-1
1.3.1+dfsg.1-1
1.3.3+dfsg.1-1
1.3.3+dfsg.1-2
1.3.6+dfsg.1-1
1.3.6+dfsg.1-1ubuntu0.1~esm1
1.3.6+dfsg.1-1ubuntu0.1~esm2
1.3.6+dfsg.1-1ubuntu0.1~esm3
1.3.6+dfsg.1-1ubuntu0.1~esm4
1.3.6+dfsg.1-1ubuntu0.1~esm5
1.3.6+dfsg.1-1ubuntu0.1~esm6
1.3.6+dfsg.1-1ubuntu0.1~esm7

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "roundcube",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-core",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-mysql",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-pgsql",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-plugins",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-sqlite3",
            "binary_version": "1.3.6+dfsg.1-1ubuntu0.1~esm8"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2019-15237",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-42010",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-25916",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26079",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8223-1.json"

Ubuntu:Pro:20.04:LTS / roundcube

Package

Name
roundcube
Purl
pkg:deb/ubuntu/roundcube@1.4.3+dfsg.1-1ubuntu0.1~esm8?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3+dfsg.1-1ubuntu0.1~esm8

Affected versions

1.*
1.3.8+dfsg.1-2
1.3.10+dfsg.1-1
1.4.1+dfsg.1-2
1.4.2+dfsg.1-1
1.4.2+dfsg.1-2
1.4.3+dfsg.1-1
1.4.3+dfsg.1-1ubuntu0.1~esm1
1.4.3+dfsg.1-1ubuntu0.1~esm2
1.4.3+dfsg.1-1ubuntu0.1~esm3
1.4.3+dfsg.1-1ubuntu0.1~esm4
1.4.3+dfsg.1-1ubuntu0.1~esm5
1.4.3+dfsg.1-1ubuntu0.1~esm6
1.4.3+dfsg.1-1ubuntu0.1~esm7

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "roundcube",
            "binary_version": "1.4.3+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-core",
            "binary_version": "1.4.3+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-mysql",
            "binary_version": "1.4.3+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-pgsql",
            "binary_version": "1.4.3+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-plugins",
            "binary_version": "1.4.3+dfsg.1-1ubuntu0.1~esm8"
        },
        {
            "binary_name": "roundcube-sqlite3",
            "binary_version": "1.4.3+dfsg.1-1ubuntu0.1~esm8"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2019-15237",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-42010",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-25916",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26079",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8223-1.json"

Ubuntu:Pro:22.04:LTS / roundcube

Package

Name
roundcube
Purl
pkg:deb/ubuntu/roundcube@1.5.0+dfsg.1-2ubuntu0.1~esm6?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.0+dfsg.1-2ubuntu0.1~esm6

Affected versions

1.*
1.4.11+dfsg.1-4
1.5.0+dfsg.1-2
1.5.0+dfsg.1-2ubuntu0.1~esm1
1.5.0+dfsg.1-2ubuntu0.1~esm2
1.5.0+dfsg.1-2ubuntu0.1~esm3
1.5.0+dfsg.1-2ubuntu0.1~esm4
1.5.0+dfsg.1-2ubuntu0.1~esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "roundcube",
            "binary_version": "1.5.0+dfsg.1-2ubuntu0.1~esm6"
        },
        {
            "binary_name": "roundcube-core",
            "binary_version": "1.5.0+dfsg.1-2ubuntu0.1~esm6"
        },
        {
            "binary_name": "roundcube-mysql",
            "binary_version": "1.5.0+dfsg.1-2ubuntu0.1~esm6"
        },
        {
            "binary_name": "roundcube-pgsql",
            "binary_version": "1.5.0+dfsg.1-2ubuntu0.1~esm6"
        },
        {
            "binary_name": "roundcube-plugins",
            "binary_version": "1.5.0+dfsg.1-2ubuntu0.1~esm6"
        },
        {
            "binary_name": "roundcube-sqlite3",
            "binary_version": "1.5.0+dfsg.1-2ubuntu0.1~esm6"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2024-38356",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-38357",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-42008",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-42010",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-25916",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26079",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8223-1.json"

Ubuntu:Pro:24.04:LTS / roundcube

Package

Name
roundcube
Purl
pkg:deb/ubuntu/roundcube@1.6.6+dfsg-2ubuntu0.1+esm3?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.6+dfsg-2ubuntu0.1+esm3

Affected versions

1.*
1.6.2+dfsg-1
1.6.4+dfsg-1
1.6.5+dfsg-1
1.6.6+dfsg-1
1.6.6+dfsg-2
1.6.6+dfsg-2ubuntu0.1
1.6.6+dfsg-2ubuntu0.1+esm1
1.6.6+dfsg-2ubuntu0.1+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "roundcube",
            "binary_version": "1.6.6+dfsg-2ubuntu0.1+esm3"
        },
        {
            "binary_name": "roundcube-core",
            "binary_version": "1.6.6+dfsg-2ubuntu0.1+esm3"
        },
        {
            "binary_name": "roundcube-mysql",
            "binary_version": "1.6.6+dfsg-2ubuntu0.1+esm3"
        },
        {
            "binary_name": "roundcube-pgsql",
            "binary_version": "1.6.6+dfsg-2ubuntu0.1+esm3"
        },
        {
            "binary_name": "roundcube-plugins",
            "binary_version": "1.6.6+dfsg-2ubuntu0.1+esm3"
        },
        {
            "binary_name": "roundcube-sqlite3",
            "binary_version": "1.6.6+dfsg-2ubuntu0.1+esm3"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2024-38356",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-38357",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-42008",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-42010",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-25916",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26079",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8223-1.json"