git: adef1eedd477 - main - security/vuxml: Document Roundcube vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 19 Mar 2026 07:24:22 UTC
The branch main has been updated by brnrd:
URL: https://cgit.FreeBSD.org/ports/commit/?id=adef1eedd47734f0dc78449d492ac51412a998ff
commit adef1eedd47734f0dc78449d492ac51412a998ff
Author: Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2026-03-19 07:24:20 +0000
Commit: Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2026-03-19 07:24:20 +0000
security/vuxml: Document Roundcube vulnerabilities
---
security/vuxml/vuln/2026.xml | 32 ++++++++++++++++++++++++++++++++
1 file changed, 32 insertions(+)
diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml
index e3f205ccadf3..b0e3e1dfda71 100644
--- a/security/vuxml/vuln/2026.xml
+++ b/security/vuxml/vuln/2026.xml
@@ -1,3 +1,35 @@
+ <vuln vid="c5b93cb5-2363-11f1-81da-8447094a420f">
+ <topic>Roundcube -- Multiple vulnerabilities</topic>
+ <affects>
+<package>
+<name>roundcube</name>
+<range><lt>1.6.14,1</lt></range>
+</package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Roundcube project reports:</p>
+ <blockquote cite="https://github.com/roundcube/roundcubemail/releases/tag/1.6.14">
+ <p>pre-auth arbitrary file write via unsafe deserialization in redis/memcache session handler</p>
+ <p>password could get changed without providing the old password</p>
+ <p>IMAP Injection + CSRF bypass in mail search</p>
+ <p>remote image blocking bypass via various SVG animate attributes</p>
+ <p>remote image blocking bypass via a crafted body background attribute</p>
+ <p>fixed position mitigation bypass via use of !important</p>
+ <p>XSS issue in a HTML attachment preview</p>
+ <p>SSRF + Information Disclosure via stylesheet links to a local network hosts</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/roundcube/roundcubemail/releases/tag/1.6.14</url>
+ </references>
+ <dates>
+ <discovery>2026-03-18</discovery>
+ <entry>2026-03-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="db3bdcc6-377f-47d9-9ce8-4bdede4fdafe">
<topic>homebox -- multiple vulnerabilities</topic>
<affects>