USN-8223-1: Roundcube Webmail vulnerabilities

Publication date

29 April 2026

Overview

Several security issues were fixed in Roundcube Webmail.


Packages

  • roundcube - skinnable AJAX based webmail solution for IMAP servers - metapackage

Details

It was discovered that Roundcube Webmail mishandled Punycode xn-- domain names.
An attacker could possibly use this issue to cause a homograph attack. (CVE-2019-15237)

It was discovered that Roundcube Webmail did not properly sanitize certain
attributes when handling CSS within HTML messages and certain SVG attributes.
An attacker could possibly use this issue to cause a cross-site scripting attack.
(CVE-2024-38356, CVE-2024-38357)

It was discovered that Roundcube Webmail did not properly sanitize certain HTML
attributes when rendering e-mail messages. An attacker could possibly use this
issue to cause a cross-site scripting attack. (CVE-2024-42008)

It was discovered that Roundcube Webmail did not properly filter certain CSS token
sequences within rendered e-mail messages. An...

It was discovered that Roundcube Webmail mishandled Punycode xn-- domain names.
An attacker could possibly use this issue to cause a homograph attack. (CVE-2019-15237)

It was discovered that Roundcube Webmail did not properly sanitize certain
attributes when handling CSS within HTML messages and certain SVG attributes.
An attacker could possibly use this issue to cause a cross-site scripting attack.
(CVE-2024-38356, CVE-2024-38357)

It was discovered that Roundcube Webmail did not properly sanitize certain HTML
attributes when rendering e-mail messages. An attacker could possibly use this
issue to cause a cross-site scripting attack. (CVE-2024-42008)

It was discovered that Roundcube Webmail did not properly filter certain CSS token
sequences within rendered e-mail messages. An attacker could possibly use this
issue to obtain sensitive information. (CVE-2024-42010)

It was discovered that Roundcube Webmail did not properly treat an SVG
tag as an image source within its HTML sanitizer. An attacker could possibly use
this issue to bypass remote image blocking to track email open actions or
potentially bypass access control. (CVE-2026-25916)

It was discovered that Roundcube Webmail did not properly handle comments within
Cascading Style Sheets (CSS). An attacker could possibly use this issue to perform
a CSS injection attack. (CVE-2026-26079)


Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
24.04 LTS noble roundcube-core –  1.6.6+dfsg-2ubuntu0.1+esm3  
22.04 LTS jammy roundcube-core –  1.5.0+dfsg.1-2ubuntu0.1~esm6  
roundcube-plugins –  1.5.0+dfsg.1-2ubuntu0.1~esm6  
20.04 LTS focal roundcube-core –  1.4.3+dfsg.1-1ubuntu0.1~esm8  
roundcube-plugins –  1.4.3+dfsg.1-1ubuntu0.1~esm8  
18.04 LTS bionic roundcube-core –  1.3.6+dfsg.1-1ubuntu0.1~esm8  
roundcube-plugins –  1.3.6+dfsg.1-1ubuntu0.1~esm8  
16.04 xenial roundcube-core –  1.2~beta+dfsg.1-0ubuntu1+esm8  
roundcube-plugins –  1.2~beta+dfsg.1-0ubuntu1+esm8  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›