CVE-2025-68461

7.2 HIGH

📋 TL;DR

This CVE describes a Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail that allows attackers to inject malicious scripts via the animate tag in SVG documents. When exploited, this can lead to session hijacking, credential theft, or other malicious actions against users. All Roundcube Webmail instances before version 1.5.12 and 1.6 before 1.6.12 are affected.

💻 Affected Systems

Products:
  • Roundcube Webmail
Versions: Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable if using affected versions. The vulnerability requires SVG processing to be enabled, which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user credentials, hijack sessions, perform actions on behalf of authenticated users, or deliver malware to users' browsers.

🟠

Likely Case

Attackers would typically steal session cookies or credentials to gain unauthorized access to email accounts, potentially leading to data theft or further attacks.

🟢

If Mitigated

With proper input validation and output encoding, the risk is significantly reduced, though the vulnerability still exists until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to trick a user into interacting with a malicious SVG file, typically via email attachment or embedded content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.12 and 1.6.12

Vendor Advisory: https://roundcube.net/news/2025/12/13/security-updates-1.6.12-and-1.5.12

Restart Required: Yes

Instructions:

1. Backup your Roundcube installation and database. 2. Download the patched version (1.5.12 or 1.6.12) from the official Roundcube website. 3. Replace the existing installation with the new version. 4. Restart your web server (Apache/Nginx) and PHP-FPM if applicable. 5. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Disable SVG processing

all

Temporarily disable SVG file processing in Roundcube configuration to prevent exploitation.

Edit config/config.inc.php and add: $config['enable_svg'] = false;

Implement Content Security Policy

all

Add a Content Security Policy header to restrict script execution from untrusted sources.

Add to web server configuration: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
For Apache: .htaccess or httpd.conf
For Nginx: nginx.conf

🧯 If You Can't Patch

  • Implement strict input validation for SVG files to sanitize animate tags.
  • Use a web application firewall (WAF) with XSS protection rules to block malicious SVG content.

🔍 How to Verify

Check if Vulnerable:

Check the Roundcube version by viewing the login page source or checking the program/include/iniset.php file for version information.

Check Version:

grep -r "RCMAIL_VERSION" program/include/iniset.php

Verify Fix Applied:

After patching, verify the version is 1.5.12 or 1.6.12 or higher. Test by attempting to upload an SVG file with animate tags and ensure it's properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads or processing errors in web server logs
  • Multiple failed login attempts following SVG file access

Network Indicators:

  • HTTP requests containing malicious SVG content with animate tags
  • Unusual outbound traffic from webmail server to external domains

SIEM Query:

source="web_server_logs" AND (url="*.svg" OR user_agent CONTAINS "svg") AND status=200

🔗 References

📤 Share & Export