CVE-2026-25916

4.3 MEDIUM

📋 TL;DR

Roundcube Webmail versions before 1.5.13 and 1.6 before 1.6.13 fail to block SVG feImage elements when 'Block remote images' is enabled, allowing attackers to bypass image blocking protections. This affects Roundcube Webmail installations using the remote image blocking feature. Attackers can potentially track email opens or load external content despite user protections.

💻 Affected Systems

Products:
  • Roundcube Webmail
Versions: Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when 'Block remote images' feature is enabled in Roundcube configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can track email opens, determine user IP addresses, and potentially load malicious external content despite user's image blocking settings.

🟠

Likely Case

Email tracking through SVG feImage elements that bypass image blocking, allowing senders to confirm when emails are opened.

🟢

If Mitigated

Limited impact if proper network filtering and email security controls are in place to block external SVG content.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending specially crafted emails with SVG feImage elements to target users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.13 and 1.6.13

Vendor Advisory: https://github.com/roundcube/roundcubemail/commit/26d7677

Restart Required: No

Instructions:

1. Backup current Roundcube installation. 2. Download and install Roundcube 1.5.13 or 1.6.13 from official sources. 3. Replace existing installation files with patched version. 4. Verify configuration files are preserved.

🔧 Temporary Workarounds

Disable remote image blocking

all

Temporarily disable the 'Block remote images' feature to prevent bypass attempts

Edit config/config.inc.php and set: $config['enable_remote_images'] = true;

Content filtering at proxy level

all

Block SVG feImage elements at network perimeter or email gateway

🧯 If You Can't Patch

  • Implement network-level filtering to block SVG feImage requests to external domains
  • Educate users about email tracking risks and advise against opening suspicious emails

🔍 How to Verify

Check if Vulnerable:

Check Roundcube version and verify if 'Block remote images' is enabled in configuration

Check Version:

Check program/include/rcube.php or run: grep -r 'Version' program/include/rcube.php

Verify Fix Applied:

Verify installation is version 1.5.13 or higher (for 1.5.x) or 1.6.13 or higher (for 1.6.x)

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file requests in web server logs
  • External image requests despite blocking settings

Network Indicators:

  • Outbound requests to external domains with SVG feImage parameters

SIEM Query:

web_server_logs WHERE uri CONTAINS '.svg' AND query_string CONTAINS 'feImage'

🔗 References

📤 Share & Export