FreeBSD : Roundcube -- Multiple vulnerabilities (c5b93cb5-2363-11f1-81da-8447094a420f)

high Nessus Plugin ID 303107

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the c5b93cb5-2363-11f1-81da-8447094a420f advisory.

The Roundcube project reports:
pre-auth arbitrary file write via unsafe deserialization in redis/memcache session handler password could get changed without providing the old password IMAP Injection + CSRF bypass in mail search remote image blocking bypass via various SVG animate attributes remote image blocking bypass via a crafted body background attribute fixed position mitigation bypass via use of !important XSS issue in a HTML attachment preview SSRF + Information Disclosure via stylesheet links to a local network hosts

Tenable has extracted the preceding description block directly from the FreeBSD security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://github.com/roundcube/roundcubemail/releases/tag/1.6.14

http://www.nessus.org/u?5c109863

Plugin Details

Severity: High

ID: 303107

File Name: freebsd_pkg_c5b93cb5236311f181da8447094a420f.nasl

Version: 1.1

Type: local

Published: 3/19/2026

Updated: 3/19/2026

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/o:freebsd:freebsd, p-cpe:/a:freebsd:freebsd:roundcube

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 3/19/2026

Vulnerability Publication Date: 3/18/2026