{"id":"UBUNTU-CVE-2015-5381","details":"Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI.","modified":"2025-07-16T07:48:47.527421Z","published":"2017-05-23T04:29:00Z","withdrawn":"2025-07-18T16:43:15Z","upstream":["CVE-2015-5381"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-5381"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2015/07/06/10"},{"type":"REPORT","url":"http://trac.roundcube.net/ticket/1490417"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-5381"}],"affected":[{"package":{"name":"roundcube","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.2~beta+dfsg.1-0ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2~beta+dfsg.1-0ubuntu1"}]}],"versions":["1.1.1+dfsg.1-2","1.1.2+dfsg.1-5","1.1.3+dfsg.1-1","1.1.4+dfsg.1-1"],"ecosystem_specific":{"binaries":[{"binary_name":"roundcube","binary_version":"1.2~beta+dfsg.1-0ubuntu1"},{"binary_name":"roundcube-core","binary_version":"1.2~beta+dfsg.1-0ubuntu1"},{"binary_name":"roundcube-mysql","binary_version":"1.2~beta+dfsg.1-0ubuntu1"},{"binary_name":"roundcube-pgsql","binary_version":"1.2~beta+dfsg.1-0ubuntu1"},{"binary_name":"roundcube-plugins","binary_version":"1.2~beta+dfsg.1-0ubuntu1"},{"binary_name":"roundcube-sqlite3","binary_version":"1.2~beta+dfsg.1-0ubuntu1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-5381.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}