{"id":"CVE-2020-12641","details":"rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.","aliases":["BIT-roundcube-2020-12641"],"modified":"2026-03-15T22:32:33.771711Z","published":"2020-05-04T15:15:14.417Z","related":["openSUSE-SU-2020:1516-1","openSUSE-SU-2022:10148-1","openSUSE-SU-2024:11303-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-12641"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.4.4"},{"type":"ADVISORY","url":"https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202007-41"},{"type":"FIX","url":"https://github.com/roundcube/roundcubemail/commit/fcfb099477f353373c34c8a65c9035b06b364db3"},{"type":"EVIDENCE","url":"https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/roundcube/roundcubemail","events":[{"introduced":"1d7be448f309d33c6ad4252c0abf581402891f22"},{"fixed":"1a7b603875bb397ebd2b2e69d5be0b59473f06f4"},{"introduced":"854aa7f35f6ed963033e2c0c4735852af7eca21b"},{"fixed":"fe0d97e5e0ce5e312bdf7c583cd2f7e4f2f457cf"},{"introduced":"fdbdaec9989998b2a378619273f9fb60e6ad6879"},{"fixed":"aadb13e25f73d783f731a99f9b9c2ea43bb10c79"},{"fixed":"fcfb099477f353373c34c8a65c9035b06b364db3"}],"database_specific":{"versions":[{"introduced":"1.2.0"},{"fixed":"1.2.10"},{"introduced":"1.3.0"},{"fixed":"1.3.11"},{"introduced":"1.4.0"},{"fixed":"1.4.4"}]}}],"versions":["1.2.0","1.2.1","1.2.2","1.2.3","1.2.4","1.2.5","1.2.6","1.2.7","1.2.8","1.2.9","1.3.0","1.3.1","1.3.10","1.3.2","1.3.3","1.3.4","1.3.5","1.3.6","1.3.7","1.3.8","1.3.9","1.4.0","1.4.1","1.4.2","1.4.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-12641.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp2"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}