{"id":"CVE-2024-42009","details":"A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.","modified":"2026-04-10T05:10:17.086640Z","published":"2024-08-05T19:15:38.220Z","related":["MGASA-2024-0279","openSUSE-SU-2024:0328-1","openSUSE-SU-2024:14243-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-42009"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.5.8"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.6.8"},{"type":"ADVISORY","url":"https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8"},{"type":"ADVISORY","url":"https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/"},{"type":"ADVISORY","url":"https://github.com/roundcube/roundcubemail/releases"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/roundcube/roundcubemail","events":[{"introduced":"0"},{"fixed":"ed988390312e0ad16843dbd1eb7a1e82241545d2"},{"introduced":"993b888afe29c383bf45c84f17090f4db96367ba"},{"fixed":"44ed0d6fb0cefe30c9c7892c61c34a21a7213c56"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.5.8"},{"introduced":"1.6.0"},{"fixed":"1.6.8"}]}}],"versions":["1.1-beta","1.1-rc","1.1.0","1.2-beta","1.2-rc","1.3-beta","1.4-beta","1.4-rc1","1.4-rc2","1.5-beta","1.5-rc","1.5.0","1.5.1","1.5.2","1.5.3","1.5.4","1.5.5","1.5.6","1.5.7","1.6.0","1.6.1","1.6.2","1.6.3","1.6.4","1.6.5","1.6.6","1.6.7","v0.1-beta2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42009.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}]}