We just published security updates to the 1.6 and 1.5 LTS versions of
Roundcube Webmail, as well as a release candidate for coming 1.7.
It provides fixes to some regressions introduced in the previous release
as well a recently reported security vulnerability.
## Security fixes
- SVG Animate FUNCIRI Attribute Bypass — Remote Image Loading via
fill/filter/stroke, reported by class_nzm.
See the full changelogs in the release notes on the Github download
pages for the updated versions
- https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc6
- https://github.com/roundcube/roundcubemail/releases/tag/1.6.15
- https://github.com/roundcube/roundcubemail/releases/tag/1.5.15
We strongly recommend to update your productive installations of
Roundcube with this new versions.
--
Alec
We just published security updates to the 1.6 and 1.5 LTS versions of
Roundcube Webmail, as well as a release candidate for coming 1.7.
They contain fixes for recently reported set of security vulnerabilities.
## Security fixes
- Fix pre-auth arbitrary file write via unsafe deserialization in
redis/memcache session handler, reported by y0us.
- Fix bug where a password could get changed without providing the old
password, reported by flydragon777.
- Fix IMAP Injection + CSRF bypass in mail search, reported by Martila
Security Research Team.
- Fix remote image blocking bypass via various SVG animate attributes,
reported by nullcathedral.
- Fix remote image blocking bypass via a crafted body background
attribute, reported by nullcathedral.
- Fix fixed position mitigation bypass via use of !important, reported
by nullcathedral.
- Fix XSS issue in a HTML attachment preview, reported by aikido_security.
- Fix SSRF + Information Disclosure via stylesheet links to a local
network hosts, reported by Georgios Tsimpidas (aka Frey), Security
Researcher at https://i0.rs/.
See the full changelogs in the release notes on the Github download
pages for the updated versions
- https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc5
- https://github.com/roundcube/roundcubemail/releases/tag/1.6.14
- https://github.com/roundcube/roundcubemail/releases/tag/1.5.14
We strongly recommend to update your productive installations of
Roundcube with this new versions.
--
Alec
We just published the fourth release candidate for the next major version 1.7 of Roundcube webmail.
This release fixes two minor issues, it's mostly published to fix a file permission problem in the previous release v1.7-rc3.
The changes are:
- Ensure correct file permissions when building a release.
- Installer: Fix broken link to download the created configuration file (#10092)
The tarballs can be downloaded [from roundcube.net/download](https://roundcube.net/download/).
Or directly from [the release page at github.com](https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc4).
We believe it is production ready, but we recommend to test it on a separate environment.
Migrate existing configs with either the `installto.sh` or the `update.sh` scripts.
And don't forget to backup your data before installing it!
Regards, Pablo
--
Pablo Zimdahl
Software Engineer
oOo Nextcloud - Regain control over your data
pablo.zimdahl(a)nextcloud.com
nextcloud.com
+49 711 25 24 28 90
Nextcloud GmbH
Hauptmannsreute 44A, 70192 Stuttgart, Germany
GF: Frank Karlitschek
HRB 227086 (AG München)
Regards, Pablo
--
Pablo Zimdahl
Software Engineer
oOo Nextcloud - Regain control over your data
pablo.zimdahl(a)nextcloud.com
nextcloud.com
+49 711 25 24 28 90
Nextcloud GmbH
Hauptmannsreute 44A, 70192 Stuttgart, Germany
GF: Frank Karlitschek
HRB 227086 (AG München)
We just published the third release candidate for the next major version 1.7 of Roundcube webmail.
This release fixes two security issues, and contains a few more fixes for several issues.
The security fixes are:
- Fix CSS injection vulnerability reported by CERT Polska.
- Fix remote image blocking bypass via SVG content reported by nullcathedral.
For the full changelog please see the release page: https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc3.
The tarballs can be downloaded via roundcube.net: https://roundcube.net/download/
Or directly from the release page at github.com: https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc3
We believe it is production ready, but we recommend to test it on a separate environment.
Migrate existing configs with either the `installto.sh` or the `update.sh` scripts.
And don't forget to backup your data before installing it!
Regards, Pablo
--
Pablo Zimdahl
Software Engineer
oOo Nextcloud - Regain control over your data
pablo.zimdahl(a)nextcloud.com
nextcloud.com
+49 711 25 24 28 90
Nextcloud GmbH
Hauptmannsreute 44A, 70192 Stuttgart, Germany
GF: Frank Karlitschek
HRB 227086 (AG München)
We just published security updates to the 1.6 and 1.5 LTS versions of
Roundcube Webmail. They both contain fixes for recently reported two
security vulnerabilities.
Security fixes:
- Fix CSS injection vulnerability reported by CERT Polska.
- Fix remote image blocking bypass via SVG content reported by
nullcathedral.
See the full changelogs in the release notes on the Github download
pages for the updated versions 1.6.13 and 1.5.13.
https://github.com/roundcube/roundcubemail/releases/tag/1.6.13https://github.com/roundcube/roundcubemail/releases/tag/1.5.13
We strongly recommend to update all productive installations of
Roundcube 1.6.x and 1.5.x with this new versions.
--
Alec
We just published the second release candidate for the next major
version 1.7 of Roundcube webmail.
This release fixes two security issues and one syntax error in a
database migration file for Postgres databases.
The changes are:
- Fix Cross-Site-Scripting vulnerability via SVG’s animate tag reported
by Valentin T., CrowdStrike.
- Fix Information Disclosure vulnerability in the HTML style sanitizer
reported by somerandomdev.
- Fix syntax error in DDL scripts for Postgres (#10052)
The tarballs can be downloaded from github.com or roundcube.net:
https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc2https://roundcube.net/download/
We believe it is production ready, but we recommend to test it on a
separate environment.
Existing setups can be migrated with either the `installto.sh` or the
`update.sh` scripts.
Please don't forget to backup your data before updating!
Regards,
Pablo
--
Pablo Zimdahl
Software Engineer
oOo Nextcloud - Regain control over your data
pablo.zimdahl(a)nextcloud.com
nextcloud.com
+49 711 25 24 28 90
Nextcloud GmbH
Hauptmannsreute 44A, 70192 Stuttgart, Germany
GF: Frank Karlitschek
HRB 227086 (AG München)
We just published security updates to the 1.6 and 1.5 LTS versions of
Roundcube Webmail. They both contain fixes for recently reported two
security vulnerabilities.
Security fixes:
- Fix Cross-Site-Scripting vulnerability via SVG's animate tag reported
by Valentin T., CrowdStrike.
- Fix Information Disclosure vulnerability in the HTML style sanitizer
reported by somerandomdev.
See the full changelogs in the release notes on the Github download
pages for the updated versions 1.6.12 and 1.5.12.
https://github.com/roundcube/roundcubemail/releases/tag/1.6.12https://github.com/roundcube/roundcubemail/releases/tag/1.5.12
We strongly recommend to update all productive installations of
Roundcube 1.6.x and 1.5.x with this new versions.
--
Alec
The development team is pleased to announce the release candidate for
the next major version 1.7 of Roundcube webmail!
With this milestone we introduce a few breaking changes (see below) and
some further improvements in comparison to 1.7-beta2.
Some noteworthy changes are:
* Add scope parameter to contact search (#9863)
* Add ability to chose from all available contact fields on CSV import
(#9419)
* Add a new plugin called `markdown_editor` that provides an alternative
editor to compose emails using Markdown syntax.
* Add `rel=’noopener’` to all links opening in a new window to mitigate
against misuse in older browsers.
Breaking Changes:
* Remove `contact_search_name` option in favor of
`contactlist_name_template` (#9832)
* Replace session attribute `changed` by `expires_at` (to allow for
variable session lengths per-user in a future change).
* Password: Removed the (insecure) `virtualmin` driver (#8007)
For full details and download links please read the release notes:
https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc
We believe it is production ready, but we recommend to test it on a
separate environment.
Migrate existing configs with either the `installto.sh` or the
`update.sh` scripts.
And don’t forget to backup your data before installing it!
Regards,
Pablo
--
Pablo Zimdahl
Software Engineer
oOo Nextcloud - Regain control over your data
pablo.zimdahl(a)nextcloud.com
nextcloud.com
+49 711 25 24 28 90
Nextcloud GmbH
Hauptmannsreute 44A, 70192 Stuttgart, Germany
GF: Frank Karlitschek
HRB 227086 (AG München)
Help
Hi,
We have a problem with the email platform RoundCube. Message to a
certain server (@cgocable.ca) are not going through generating an error
message in return to our InBound box.
We are reported to tha Abusix platform
"https://app.abusix.com/lookup-and-delist?q=68.168.124.162", wich is
monitering the traffic through to "@cgocable.ca".
Why is this happening?
How do we get rid of that error.
Here is a copy of one of the many messages we received:
This message was created automatically by mail delivery software.
A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:
yvan.jalbert(a)cgocable.ca
host mx3.cgocable.ca [129.158.33.68]
SMTP error from remote mail server after initial connection:
550 5.7.1 [C16] RBL Restriction: See
https://lookup.abusix.com/search?q=68.168.124.162
Reporting-MTA: dns; srv12.swhc.ca
Action: failed
Final-Recipient: rfc822;yvan.jalbert(a)cgocable.ca
Status: 5.0.0
Remote-MTA: dns; mx3.cgocable.ca
Diagnostic-Code: smtp; 550 5.7.1 [C16] RBL Restriction: See
https://lookup.abusix.com/search?q=68.168.124.162
Return-path: <info(a)smpm.org>
Received: from [::1] (port=45876 helo=srv12.swhc.ca)
by srv12.swhc.ca with esmtpa (Exim 4.98.2)
(envelope-from <info(a)smpm.org>)
id 1vIXWm-0000000Dw27-3Ud4;
Mon, 10 Nov 2025 14:26:12 -0500
MIME-Version: 1.0
Date: Mon, 10 Nov 2025 14:26:12 -0500
From: SMPM <info(a)smpm.org>
To: info(a)amimoucheur.com
Subject:
=?UTF-8?Q?Salon_de_p=C3=AAche_=C3=A0_la_mouche_2025_-_Paiement_d?=
=?UTF-8?Q?e_L=27ami_du_moucheur_-_Facture_=23_2025-013?=
User-Agent: Roundcube Webmail/1.6.11
Message-ID: <48274988b9512a56bd5a0e5864741ac6(a)smpm.org>
X-Sender: info(a)smpm.org
Organization:
=?UTF-8?Q?Soci=C3=A9t=C3=A9_Mauricienne_des_p=C3=AAcheurs_?=
=?UTF-8?Q?=C3=A0_la_mouche?=
Disposition-Notification-To: SMPM <info(a)smpm.org>
Content-Type: multipart/mixed;
boundary="=_1da6ea91ba58e8f8f9e435fbc2434174"
X-Exim-DSN-Information: Due to administrative limits only headers are
returned
Thank you in advance for your help,
Sincerely,
Denis Lamy
Trois-Rivieres, Qc
The development team is pleased to announce the second beta release for
the next major version 1.7 of Roundcube webmail.
With this milestone we introduce some more fixes, and bring full support
for the early version of PHP 8.5.
It does not include breaking changes (beyond those of 1.7-beta).
Some noteworthy changes are:
- Support PHP v8.5(-pre) without deprecation warnings.
- Support IPv6 in database DSN (#9937)
- Use `htmleditor` setting also for identity signature (#9954)
- Fix regression in handling of non-unicode characters in a plain text
message (#9953)
- Fix parsing of inline styles that aren't well-formatted (#9948)
- Support early MIME types for S/MIME encrypted messages (#9973)
- Only apply fix_path for href attrib in <link>s (#9943)
- Show homograph-warning-icon before email address, unify warning
wording (#9945)
- Show full details with warning icon in case of phishing suspicion
(#9945)
- Prepend group-names to display-name (#9945) Thanks to coco_melon for
the reporting!
- Wash the `name` attribute also on more elements (#9949) – Thanks to
pwn.ai by Octagon Networks for the reporting!
- Sanitize filename on download (#9960)
- Drop Internet Explorer from supported browsers (#9963)
- Enforce leading backslash for non-namespaced non-Roundcube uses
(#9935)
- Use asset_url() instead of get_skin_file() for deleteicon on contact
edit form (#9933)
- Several changes to the test tooling.
For full details please see the release notes:
https://github.com/roundcube/roundcubemail/releases/tag/1.7-beta2
This is a beta release and we recommend to test it on a separate
environment.
Migrate existing configs with either the installto.sh or the update.sh
scripts.
And don't forget to backup your data before installing it!
Regards,
Pablo
--
Pablo Zimdahl
Software Engineer
oOo Nextcloud - Regain control over your data
pablo.zimdahl(a)nextcloud.com
nextcloud.com
+49 711 25 24 28 90
Nextcloud GmbH
Hauptmannsreute 44A, 70192 Stuttgart, Germany
GF: Frank Karlitschek
HRB 227086 (AG München)