An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to a fixed-position mitigation bypass via the use of !important.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Fixed-Position Mitigation Bypass via CSS Injection in Roundcube Webmail | |
| First Time appeared |
Roundcube
Roundcube webmail |
|
| Vendors & Products |
Roundcube
Roundcube webmail |
Fri, 03 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to a fixed-position mitigation bypass via the use of !important. | |
| Weaknesses | CWE-669 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-03T12:50:12.338Z
Reserved: 2026-04-03T03:59:48.463Z
Link: CVE-2026-35544
Updated: 2026-04-03T12:50:09.218Z
Status : Undergoing Analysis
Published: 2026-04-03T05:16:22.810
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-35544
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:15:50Z