CVE-2024-42009

Analyzed
Published: 05 Aug 2024, 00:00
Last modified:21 Oct 2025, 22:55

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
9.3 CRITICAL
v3.1 (cve.org)
EPSS Score
91.16% CRITICAL
91% probability -0.06%
KEV
Listed
CISA • ENISA
2 listings
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

05 Aug 2024, 00:00
Published
Vulnerability first disclosed
09 Jun 2025, 00:00
Added to CISA KEV
RoundCube Webmail Cross-Site Scripting Vulnerability
30 Jun 2025, 00:00
CISA Remediation Due
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
21 Oct 2025, 22:55
Last Modified
Vulnerability information updated
27 Apr 2026, 00:00
Added to ENISA KEV
Added to Known Exploited Vulnerabilities catalog

Description

A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.

CVSS Metrics

  • v3.1CRITICALScore: 9.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS Trends

Current EPSS score: 91.16% Percentile: 100%

Techniques & Countermeasures

  • CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

    The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Affected Systems

  • UnknownWebmail

    < 1.5.8 | ≥ 1.6.0, < 1.6.8

References (6)