Published:2009/11/04  Last Updated:2009/11/04

Roundcube Webmail vulnerable to cross-site request forgery


Roundcube Webmail provided by Roundcube Webmail Project contains a cross-site requesst forgery vulnerability.

Products Affected

  • Roundcube Webmail 0.2.2 and earlier


Roundcube Webmail is an open source webmail client from the Roundcube Webmail Project. Roundcube Webmail contains a cross-site request forgery vulnerability.

This issue is different from JVN#33820033 and JVN#72974205.


An attacker may be able to send arbitrary emails.


Update the Software
Apply the latest update provided by the developer.

Vendor Status

Vendor Link
Roundcube Webmail Project Version 0.3-stable released


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2009.11.04

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures


Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2009-4077
JVN iPedia JVNDB-2009-000072

Update History