CVE-2026-26079
Advisory lineage Upstream: 0 Downstream: 5
Awaiting Analysis
Published: 11 Feb 2026, 04:27
Last modified:11 Feb 2026, 16:06
Vulnerability Summary
Overall Risk (default)
low
19/100 CVSS Score
4.7 MEDIUM
v3.1 (cve.org)
EPSS Score
0.09% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
11 Feb 2026, 04:27
Published
Vulnerability first disclosed
11 Feb 2026, 16:06
Last Modified
Vulnerability information updated
Description
Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading Style Sheets (CSS) injection, e.g., because comments are mishandled.
CVSS Metrics
- v3.1•MEDIUM•Score: 4.7CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
EPSS Trends
Current EPSS score: 0.09%• Percentile: 25%
Techniques & Countermeasures
- CWE-829•Inclusion of Functionality from Untrusted Control Sphere
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Affected Systems
- roundcube•webmail
< 1.5.13 | ≥ 1.6.0, < 1.6.13
References (9)
- https://roundcube.net/news/2026/02/08/security-updates-1.6.13-and-1.5.13
- https://github.com/roundcube/roundcubemail/releases/tag/1.6.13
- https://github.com/roundcube/roundcubemail/commit/1f4c3a5af5033747f9685a8a395dbd8228d19816
- https://github.com/roundcube/roundcubemail/commit/2b5625f1d2ef7e050fd1ae481b2a52dc35466447
- https://github.com/roundcube/roundcubemail/commit/53d75d5dfebef235a344d476b900c20c12d52b01
- https://github.com/roundcube/roundcubemail/releases/tag/1.5.13
- https://github.com/roundcube/roundcubemail/commit/bf89cbaa5897d8ad62e8057d9a3f6babb90b7954
- https://github.com/roundcube/roundcubemail/commit/5a3315cce587e0be58335d11ff9a5571c90494a5
- https://github.com/roundcube/roundcubemail/commit/c15f5dbf093a497e19a749b20e7f8fb5a9c24cde