CVE-2020-35730

6.1 MEDIUM CISA KEV - Actively Exploited
Published: December 28, 2020 Modified: November 04, 2025

Description

An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978491
Source: cve@mitre.org
Issue Tracking Mailing List
https://roundcube.net/download/
Source: cve@mitre.org
Product
https://www.alexbirnberg.com/roundcube-xss.html
Source: cve@mitre.org
Broken Link
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978491
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List
https://github.com/roundcube/roundcubemail/compare/1.4.9...1.4.10
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/roundcube/roundcubemail/releases/tag/1.2.13
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/roundcube/roundcubemail/releases/tag/1.3.16
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/roundcube/roundcubemail/releases/tag/1.4.10
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://roundcube.net/download/
Source: af854a3a-2127-422b-91ae-364da2661108
Product
https://www.alexbirnberg.com/roundcube-xss.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-35730
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

19 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.1 / 10.0
EPSS (Exploit Probability)
62.6%
98th percentile
Exploitation Status
Actively Exploited
Remediation due: 2023-07-13

Weaknesses (CWE)

Affected Vendors

debian roundcube fedoraproject