{"id":"CVE-2024-42008","details":"A Cross-Site Scripting vulnerability in rcmail_action_mail_get-\u003erun() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.","modified":"2026-04-10T05:15:59.764573Z","published":"2024-08-05T19:15:38.153Z","related":["MGASA-2024-0279","openSUSE-SU-2024:0328-1","openSUSE-SU-2024:14243-1"],"references":[{"type":"ADVISORY","url":"https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.5.8"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.6.8"},{"type":"ARTICLE","url":"https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/roundcube/roundcubemail","events":[{"introduced":"0"},{"fixed":"ed988390312e0ad16843dbd1eb7a1e82241545d2"},{"introduced":"993b888afe29c383bf45c84f17090f4db96367ba"},{"fixed":"44ed0d6fb0cefe30c9c7892c61c34a21a7213c56"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.5.8"},{"introduced":"1.6.0"},{"fixed":"1.6.8"}]}}],"versions":["1.1-beta","1.1-rc","1.1.0","1.2-beta","1.2-rc","1.3-beta","1.4-beta","1.4-rc1","1.4-rc2","1.5-beta","1.5-rc","1.5.0","1.5.1","1.5.2","1.5.3","1.5.4","1.5.5","1.5.6","1.5.7","1.6.0","1.6.1","1.6.2","1.6.3","1.6.4","1.6.5","1.6.6","1.6.7","v0.1-beta2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42008.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}]}