to load arbitrary JavaScript code.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3630-1 | roundcube security update |
Debian DSA |
DSA-5531-1 | roundcube security update |
Ubuntu USN |
USN-6848-1 | Roundcube vulnerabilities |
Tue, 21 Oct 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code. | Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code. |
Mon, 03 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Status: PUBLISHED
Assigner: ESET
Published:
Updated: 2025-10-21T23:05:34.074Z
Reserved: 2023-10-18T06:50:57.504Z
Link: CVE-2023-5631
Updated: 2024-08-02T08:07:32.513Z
Status : Analyzed
Published: 2023-10-18T15:15:08.727
Modified: 2025-10-30T20:11:10.923
Link: CVE-2023-5631
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN