Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25916: CWE-420 Unprotected Alternate Channel in Roundcube Webmail

0
Medium
VulnerabilityCVE-2026-25916cvecve-2026-25916cwe-420
Published: Mon Feb 09 2026 (02/09/2026, 08:14:10 UTC)
Source: CVE Database V5
Vendor/Project: Roundcube
Product: Webmail

Description

CVE-2026-25916 is a medium severity vulnerability in Roundcube Webmail versions before 1. 5. 13 and 1. 6 before 1. 6. 13. When the 'Block remote images' feature is enabled, the application fails to block SVG feImage elements, allowing remote image content to be loaded. This unprotected alternate channel can be exploited to bypass privacy protections intended to prevent remote content loading, potentially leaking user information. The vulnerability does not impact integrity or availability and requires user interaction to trigger. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/16/2026, 13:33:36 UTC

Technical Analysis

CVE-2026-25916 is a vulnerability classified under CWE-420 (Unprotected Alternate Channel) affecting Roundcube Webmail versions prior to 1.5.13 and 1.6 before 1.6.13. The issue arises when the 'Block remote images' feature is enabled to prevent automatic loading of external images in emails, a common privacy protection mechanism. However, the vulnerability allows SVG feImage elements embedded within emails to bypass this block, enabling remote image content to be loaded despite the setting. SVG feImage is a filter primitive in SVG that can reference external images, and Roundcube's filtering mechanism does not adequately block this vector. This can lead to privacy violations by allowing remote servers to detect when an email is opened or to gather user-related metadata. The vulnerability has a CVSS v3.1 base score of 4.3 (medium severity), reflecting its network attack vector, low complexity, no privileges required, but requiring user interaction (opening the email). The impact is limited to confidentiality as it does not affect data integrity or system availability. No patches or exploits are currently documented, but the issue is publicly disclosed and should be addressed by upgrading Roundcube to versions 1.5.13 or 1.6.13 and later, where this filtering behavior is corrected.

Potential Impact

For European organizations, the primary impact of CVE-2026-25916 is the potential leakage of user privacy and metadata through unintended remote image loading in webmail clients. This could lead to unauthorized tracking of email open events and user behavior, undermining confidentiality. Organizations subject to GDPR and other stringent data protection regulations may face compliance risks if user data is inadvertently exposed. While the vulnerability does not compromise system integrity or availability, the privacy implications could erode user trust and expose organizations to regulatory scrutiny. Since Roundcube is widely used in European small to medium enterprises and hosting providers for webmail services, the scope of affected systems is significant. The lack of known active exploits reduces immediate risk, but the ease of exploitation through crafted emails means attackers could leverage this vector for targeted surveillance or phishing campaigns.

Mitigation Recommendations

To mitigate CVE-2026-25916, organizations should upgrade Roundcube Webmail installations to version 1.5.13 or 1.6.13 and later, where the SVG feImage blocking issue is resolved. Until patches are applied, administrators can implement additional email filtering rules to strip or sanitize SVG content from incoming emails, especially those containing feImage elements. Disabling SVG rendering in the email client or restricting SVG content types can reduce exposure. Network-level controls such as blocking outbound HTTP/HTTPS requests from the webmail server to untrusted domains may limit remote image retrieval. User awareness training to avoid opening suspicious emails can also reduce risk. Monitoring webmail logs for unusual external resource requests may help detect exploitation attempts. Finally, organizations should review their privacy policies and inform users about potential risks related to remote content loading in emails.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-09T08:14:10.021Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69899b534b57a58fa1382738

Added to database: 2/9/2026, 8:31:15 AM

Last enriched: 2/16/2026, 1:33:36 PM

Last updated: 3/25/2026, 7:35:50 PM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses