CVE-2023-5631

CVE Published 2023-10-18
Related CWE(s) CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Related Vendor(s) fedoraproject, roundcube, debian
Related Product(s) fedora, webmail, debian_linux
Exploitation Reported (CISA KEV) 2023-10-26
CVSS 3 Base Score 6.1 (MEDIUM)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector NETWORK

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker

to load arbitrary JavaScript code.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Threat Reports Related to CVE-2023-5631

Report

Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign

The Insikt Group has observed the TAG-70 using cross-site scripting (XSS) vulnerabilities to target Roundcube webmail servers in Europe. The ...

Associated CAPEC Patterns

References