Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6196-1 | roundcube security update |
Github GHSA |
GHSA-8jr8-v43g-5c57 | Roundcube Webmail: Unsanitized IMAP SEARCH command arguments |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unsanitized IMAP SEARCH arguments in Roundcube allow injection or CSRF bypass |
Tue, 07 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:* |
Fri, 03 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unsanitized IMAP SEARCH arguments in Roundcube allow injection or CSRF bypass | |
| First Time appeared |
Roundcube
Roundcube webmail |
|
| Vendors & Products |
Roundcube
Roundcube webmail |
Fri, 03 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsanitized IMAP SEARCH command arguments could lead to IMAP injection or CSRF bypass during mail search. | |
| Weaknesses | CWE-88 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-03T13:11:22.365Z
Reserved: 2026-04-03T03:35:36.541Z
Link: CVE-2026-35538
Updated: 2026-04-03T13:11:18.792Z
Status : Analyzed
Published: 2026-04-03T05:16:21.647
Modified: 2026-04-07T20:54:28.020
Link: CVE-2026-35538
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:54:24Z
Debian DSA
Github GHSA