{"id":"CVE-2020-35730","details":"An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.","aliases":["BIT-roundcube-2020-35730"],"modified":"2026-04-16T00:03:40.464185823Z","published":"2020-12-28T20:15:13.150Z","related":["openSUSE-SU-2021:0931-1","openSUSE-SU-2021:0942-1","openSUSE-SU-2021:0943-1","openSUSE-SU-2021:0959-1","openSUSE-SU-2021:0974-1","openSUSE-SU-2021:1014-1","openSUSE-SU-2022:10148-1","openSUSE-SU-2024:11303-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"32"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"33"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://roundcube.net/download/"},{"type":"WEB","url":"https://www.alexbirnberg.com/roundcube-xss.html"},{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-35730"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.2.13"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.3.16"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.4.10"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCEU4BM5WGIDJWP6Z4PCH62ZMH57QYM2/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HMLIZWKMTRCLU7KZLEQHELS4INXJ7X5Q/"},{"type":"REPORT","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978491"},{"type":"FIX","url":"https://github.com/roundcube/roundcubemail/compare/1.4.9...1.4.10"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/roundcube/roundcubemail","events":[{"introduced":"0"},{"fixed":"9b69cce641a8c34c7efcb34628287d4fadf7bbaf"},{"introduced":"854aa7f35f6ed963033e2c0c4735852af7eca21b"},{"fixed":"54bf3d0d1acba03db785d16bb53564e417c3883e"},{"introduced":"fdbdaec9989998b2a378619273f9fb60e6ad6879"},{"fixed":"4efec49a46a3f4aab58f606d06b669b6498a0811"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.2.13"},{"introduced":"1.3.0"},{"fixed":"1.3.16"},{"introduced":"1.4"},{"fixed":"1.4.10"}],"cpe":"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"]}}],"versions":["1.1-beta","1.1-rc","1.1.0","1.2-beta","1.2-rc","1.2.0","1.2.1","1.2.10","1.2.11","1.2.12","1.2.2","1.2.3","1.2.4","1.2.5","1.2.6","1.2.7","1.2.8","1.2.9","1.3.0","1.3.1","1.3.10","1.3.11","1.3.12","1.3.13","1.3.14","1.3.15","1.3.2","1.3.3","1.3.4","1.3.5","1.3.6","1.3.7","1.3.8","1.3.9","1.4.0","1.4.1","1.4.2","1.4.3","1.4.4","1.4.5","1.4.6","1.4.7","1.4.8","1.4.9","v0.1-beta2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35730.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}