{"id":"CVE-2024-37385","details":"Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 on Windows allows command injection via im_convert_path and im_identify_path. NOTE: this issue exists because of an incomplete fix for CVE-2020-12641.","modified":"2026-05-18T11:54:46.567718835Z","published":"2024-06-07T03:24:23.567Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/37xxx/CVE-2024-37385.json","cna_assigner":"mitre"},"references":[{"type":"WEB","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.5.7"},{"type":"WEB","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.6.7"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/37xxx/CVE-2024-37385.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-37385"},{"type":"FIX","url":"https://github.com/roundcube/roundcubemail/commit/5ea9f37ce39374b6124586c0590fec7015d35d7f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/roundcube/roundcubemail","events":[{"introduced":"993b888afe29c383bf45c84f17090f4db96367ba"},{"fixed":"43aaaa528646877789ec028d87924ba1accf5242"}]}],"versions":["1.6.6","1.6.5","1.6.4","1.6.3","1.6.2","1.6.1","1.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-37385.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}