{"id":"UBUNTU-CVE-2015-8864","details":"Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.0.9 and 1.1.x before 1.1.5 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG, a different vulnerability than CVE-2016-4068.","modified":"2025-07-16T07:17:40.562164Z","published":"2017-04-13T14:59:00Z","withdrawn":"2025-07-18T16:43:20Z","upstream":["CVE-2015-8864"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-8864"},{"type":"REPORT","url":"https://github.com/roundcube/roundcubemail/issues/4949"},{"type":"REPORT","url":"https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115"},{"type":"REPORT","url":"https://github.com/roundcube/roundcubemail/commit/40d7342dd9c9bd2a1d613edc848ed95a4d71aa18"},{"type":"REPORT","url":"https://github.com/roundcube/roundcubemail/commit/7bbefdb63b12e2344cf1cb87aeb6e3933b4063e0"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2016/04/23/3"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-8864"}],"affected":[{"package":{"name":"roundcube","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.2~beta+dfsg.1-0ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2~beta+dfsg.1-0ubuntu1"}]}],"versions":["1.1.1+dfsg.1-2","1.1.2+dfsg.1-5","1.1.3+dfsg.1-1","1.1.4+dfsg.1-1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.2~beta+dfsg.1-0ubuntu1","binary_name":"roundcube"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1","binary_name":"roundcube-core"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1","binary_name":"roundcube-mysql"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1","binary_name":"roundcube-pgsql"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1","binary_name":"roundcube-plugins"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1","binary_name":"roundcube-sqlite3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-8864.json"}},{"package":{"name":"roundcube","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.3.6+dfsg.1-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.6+dfsg.1-1"}]}],"versions":["1.3.0+dfsg.1-1","1.3.1+dfsg.1-1","1.3.3+dfsg.1-1","1.3.3+dfsg.1-2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-core"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-mysql"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-pgsql"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-plugins"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-sqlite3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-8864.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}