rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
2020-05-04T15:15:14.417
2025-10-22T00:16:56.910
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | roundcube | webmail | < 1.2.10 | Yes |
| Application | roundcube | webmail | < 1.3.11 | Yes |
| Application | roundcube | webmail | < 1.4.4 | Yes |
| Application | opensuse | backports_sle | 15.0 | Yes |
| Application | opensuse | backports_sle | 15.0 | Yes |
| Operating System | opensuse | leap | 15.1 | Yes |
| Operating System | opensuse | leap | 15.2 | Yes |