Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 30 Jul 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:roundcube:webmail:1.5.0:-:*:*:*:*:*:* cpe:2.3:a:roundcube:webmail:1.6.0:-:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10:*:*:*:*:*:*:* |
|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published: 2023-09-22T00:00:00.000Z
Updated: 2025-10-21T23:05:36.969Z
Reserved: 2023-09-22T00:00:00.000Z
Link: CVE-2023-43770
Updated: 2024-08-02T19:52:11.104Z
Status : Modified
Published: 2023-09-22T06:15:10.090
Modified: 2025-10-21T23:16:11.477
Link: CVE-2023-43770
No data.