๐Ÿ” CVE Alert

CVE-2026-35537

LOW 3.7
CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
12th

An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsafe deserialization in the redis/memcache session handler may lead to arbitrary file write operations by unauthenticated attackers via crafted session data.

CWE CWE-502
Vendor roundcube
Product webmail
Published Apr 3, 2026
Last Updated Apr 11, 2026
Stay Ahead of the Next One

Get instant alerts for roundcube webmail

Be the first to know when new low vulnerabilities affecting roundcube webmail are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Affected Versions

Roundcube / Webmail
0 < 1.5.14 1.6.0 < 1.6.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
roundcube.net: https://roundcube.net/news/2026/03/18/security-updates-1.7-rc5-1.6.14-1.5.14 github.com: https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc5 github.com: https://github.com/roundcube/roundcubemail/commit/6d586cfa4d8a31f7957f7a445aaedd52592a0e74 github.com: https://github.com/roundcube/roundcubemail/releases/tag/1.6.14 github.com: https://github.com/roundcube/roundcubemail/commit/a4ead994d2f0ea92e4a1603196a197e0d5df1620 github.com: https://github.com/roundcube/roundcubemail/releases/tag/1.5.14 github.com: https://github.com/roundcube/roundcubemail/commit/618c5428edc69fb088e7ac6c89e506dd39df3 openwall.com: http://www.openwall.com/lists/oss-security/2026/04/11/6