Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6196-1 | roundcube security update |
Github GHSA |
GHSA-xpqh-grpw-4xmg | Roundcube Webmail: Insufficient CSS sanitization in HTML e-mail messages |
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Fixed-Position Mitigation Bypass via CSS Injection in Roundcube Webmail |
Thu, 09 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:* |
Fri, 03 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Fixed-Position Mitigation Bypass via CSS Injection in Roundcube Webmail | |
| First Time appeared |
Roundcube
Roundcube webmail |
|
| Vendors & Products |
Roundcube
Roundcube webmail |
Fri, 03 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to a fixed-position mitigation bypass via the use of !important. | |
| Weaknesses | CWE-669 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-03T12:50:12.338Z
Reserved: 2026-04-03T03:59:48.463Z
Link: CVE-2026-35544
Updated: 2026-04-03T12:50:09.218Z
Status : Analyzed
Published: 2026-04-03T05:16:22.810
Modified: 2026-04-09T01:09:00.530
Link: CVE-2026-35544
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:29:18Z
Debian DSA
Github GHSA