Known Exploited Vulnerability
9.3
CRITICAL
CVE-2024-42009
RoundCube Webmail Cross-Site Scripting Vulnerabili - [Actively Exploited]
Description

A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.

INFO

Published Date :

Aug. 5, 2024, 7:15 p.m.

Last Modified :

June 11, 2025, 3:46 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.8

Exploitability Score :

2.8
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

RoundCube Webmail contains a cross-site scripting vulnerability. This vulnerability could allow a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.

Required Action :

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Notes :

https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 ; https://nvd.nist.gov/vuln/detail/CVE-2024-42009

Public PoC/Exploit Available at Github

CVE-2024-42009 has a 5 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2024-42009 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Roundcube webmail
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-42009.

URL Resource
https://github.com/roundcube/roundcubemail/releases Release Notes
https://github.com/roundcube/roundcubemail/releases/tag/1.5.8 Release Notes
https://github.com/roundcube/roundcubemail/releases/tag/1.6.8 Release Notes
https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 Vendor Advisory
https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ Technical Description Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

CVE PoC repository monitoring tool - Automated discovery and tracking of security vulnerabilities

Python

Updated: 2 weeks, 3 days ago
0 stars 0 fork 0 watcher
Born at : June 8, 2025, 3:07 p.m. This repo has been linked 66 different CVEs too.

The scripts in this repository are made to abuse CVE-2024-42008 and CVE-2024-42009. Both of these CVEs are vulnerabilities found on Roundcube 1.6.7

JavaScript Python

Updated: 4 weeks, 2 days ago
0 stars 0 fork 0 watcher
Born at : May 26, 2025, 12:31 a.m. This repo has been linked 2 different CVEs too.

CVE-2024-42009 Proof of Concept

Python

Updated: 1 month ago
2 stars 0 fork 0 watcher
Born at : May 24, 2025, 7:15 p.m. This repo has been linked 1 different CVEs too.

This Proof of Concept (PoC) demonstrates an exploit for CVE-2024-42009, leveraging a cross-site scripting (XSS) vulnerability to extract emails from a target webmail application. The attack injects a malicious payload that exfiltrates email content to an attacker-controlled listener.

Python

Updated: 3 months, 3 weeks ago
1 stars 0 fork 0 watcher
Born at : Feb. 13, 2025, 8:53 p.m. This repo has been linked 1 different CVEs too.

This script exploits a stored XSS vulnerability (CVE-2024-42009) in Roundcube Webmail version 1.6.7. It injects a malicious payload into the webmail system, which, when triggered, exfiltrates email content from the victim’s inbox.

Python

Updated: 2 months, 2 weeks ago
2 stars 0 fork 0 watcher
Born at : Feb. 11, 2025, 11:02 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-42009 vulnerability anywhere in the article.

  • The Register
Dems demand audit of CVE program as Federal funding remains uncertain

Infosec In Brief A pair of Congressional Democrats have demanded a review of the Common Vulnerabilities and Exposures (CVE) program amid uncertainties about continued US government funding for the sch ... Read more

Published Date: Jun 15, 2025 (1 week, 2 days ago)
  • Dark Reading
PoC Code Escalates Roundcube Vuln Threat

Source: Mircea Maties via ShutterstockThe threat associated with a critical decade-old remote code execution vulnerability in Roundcube webmail has increased sharply in recent days, with proof-of-conc ... Read more

Published Date: Jun 10, 2025 (2 weeks ago)
  • Help Net Security
Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)

With an exploit for a critical Roundcube vulnerability (CVE-2025-49113) being offered for sale on underground forums and a PoC exploit having been made public, attacks exploiting the flaw are incoming ... Read more

Published Date: Jun 09, 2025 (2 weeks, 2 days ago)
  • Daily CyberSecurity
UNC1151 Exploits Roundcube Flaw in Spear Phishing Attack

CERT Polska has sounded the alarm after uncovering a spear phishing campaign that targeted Polish organizations using a critical webmail vulnerability. The campaign is linked to the UNC1151 APT group, ... Read more

Published Date: Jun 09, 2025 (2 weeks, 2 days ago)
  • Cyber Security News
Hackers Exploiting Roundcube Vulnerability to Steal User Credentials

A sophisticated spear phishing campaign targeting Polish organizations, where threat actors successfully exploited the CVE-2024-42009 vulnerability in Roundcube webmail systems. The attack enables Jav ... Read more

Published Date: Jun 06, 2025 (2 weeks, 5 days ago)
  • cert.pl
UNC1151 exploiting Roundcube to steal user credentials in a spearphishing campaign

CERT Polska has observed a spear phishing campaign targeting Polish entities this week. The threat actor attempted to exploit the CVE-2024-42009 vulnerability, which allows JavaScript code to be execu ... Read more

Published Date: Jun 05, 2025 (2 weeks, 6 days ago)
  • Help Net Security
Week in review: Tips for starting your cybersecurity career, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: August 2024 Patch Tuesday forecast: Looking for a calm August release August 2024 July ended up being ... Read more

Published Date: Aug 11, 2024 (10 months, 2 weeks ago)
  • Cyber Security News
Critical XSS Vulnerability In Roundcube Let Attackers Execute Arbitrary Code

Roundcube, a widely adopted open-source webmail application, is included by default in the popular cPanel web hosting control panel, leading to millions of installations worldwide. The software is com ... Read more

Published Date: Aug 09, 2024 (10 months, 2 weeks ago)
  • The Hacker News
Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords

Email Security / Vulnerability Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software that could be exploited to execute malicious JavaScript in a victim' ... Read more

Published Date: Aug 07, 2024 (10 months, 2 weeks ago)
  • Help Net Security
Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)

Two cross-site scripting vulnerabilities (CVE-2024-42009, CVE-2024-42008) affecting Roundcube could be exploited by attackers to steal users’ emails and contacts, email password, and send emails from ... Read more

Published Date: Aug 07, 2024 (10 months, 2 weeks ago)

The following table lists the changes that have been made to the CVE-2024-42009 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Jun. 11, 2025

    Action Type Old Value New Value
    Changed Reference Type MITRE: https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ Types: Technical Description MITRE: https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ Types: Technical Description, Third Party Advisory
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Jun. 10, 2025

    Action Type Old Value New Value
    Added Date Added 2025-06-09
    Added Due Date 2025-06-30
    Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
    Added Vulnerability Name RoundCube Webmail Cross-Site Scripting Vulnerability
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Mar. 13, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
    Added CWE CWE-79
  • Initial Analysis by [email protected]

    Sep. 06, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
    Changed Reference Type https://github.com/roundcube/roundcubemail/releases No Types Assigned https://github.com/roundcube/roundcubemail/releases Release Notes
    Changed Reference Type https://github.com/roundcube/roundcubemail/releases/tag/1.5.8 No Types Assigned https://github.com/roundcube/roundcubemail/releases/tag/1.5.8 Release Notes
    Changed Reference Type https://github.com/roundcube/roundcubemail/releases/tag/1.6.8 No Types Assigned https://github.com/roundcube/roundcubemail/releases/tag/1.6.8 Release Notes
    Changed Reference Type https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 No Types Assigned https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 Vendor Advisory
    Changed Reference Type https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ No Types Assigned https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ Technical Description
    Added CWE NIST CWE-79
    Added CPE Configuration OR *cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:* versions up to (excluding) 1.5.8 *cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:* versions from (including) 1.6.0 up to (excluding) 1.6.8
  • CVE Received by [email protected]

    Aug. 05, 2024

    Action Type Old Value New Value
    Added Description A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.
    Added Reference MITRE https://github.com/roundcube/roundcubemail/releases [No types assigned]
    Added Reference MITRE https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ [No types assigned]
    Added Reference MITRE https://github.com/roundcube/roundcubemail/releases/tag/1.5.8 [No types assigned]
    Added Reference MITRE https://github.com/roundcube/roundcubemail/releases/tag/1.6.8 [No types assigned]
    Added Reference MITRE https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-42009 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-42009 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Jun. 25, 2025 19:21