Home

Description

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsanitized IMAP SEARCH command arguments could lead to IMAP injection or CSRF bypass during mail search.

PUBLISHED Reserved 2026-04-03 | Published 2026-04-03 | Updated 2026-04-03 | Assigner mitre




LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Product status

Default status
unaffected

Any version before 1.5.14
affected

1.6.0 (semver) before 1.6.14
affected

References

roundcube.net/...3/18/security-updates-1.7-rc5-1.6.14-1.5.14

github.com/roundcube/roundcubemail/releases/tag/1.7-rc5

github.com/...ommit/5fe8a69956a9683a4269f3ad2a68e18deebf8a15

github.com/roundcube/roundcubemail/releases/tag/1.6.14

github.com/...ommit/b18a8fa8e81571914c0ff55d4e20edb459c6952c

github.com/roundcube/roundcubemail/releases/tag/1.5.14

github.com/...ommit/7daf5aa9c190ccc75bb31672d8fee9938877fd64

cve.org (CVE-2026-35538)

nvd.nist.gov (CVE-2026-35538)

Download JSON