Roundcube Vulnerable to XSS via Text/Plain E-mail Messages
CVE-2023-43770
Key Information:
Badges
What is CVE-2023-43770?
Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.
CISA has reported CVE-2023-43770
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2023-43770 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.
The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles

Patch now! Roundcube mail servers are being actively exploited | Malwarebytes
A vulnerability in Roundcube webmail is being actively exploited and CISA is urging users to install an updated version.
Roundcube webmail XSS vulnerability exploited by attackers (CVE-2023-43770) - Help Net Security
CVE-2023-43770, a vulnerability in the Roundcube webmail software that has been fixed in September 2023, is being exploited by attackers.
Alert: CISA Warns of Active 'Roundcube' Email Attacks - Patch Now
CISA has identified a medium-severity security flaw affecting Roundcube email software, categorized as CVE-2023-43770.
References
EPSS Score
73% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 💰
Used in Ransomware
- 🦅
CISA Reported
- 📰
First article discovered by Beeping Computers
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved