Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/CyberSecurity News/Roundcube Webmail Flaw Lets Attackers Track Email Vulnerability Opens
CyberSecurity News

Roundcube Webmail Flaw Lets Attackers Track Email Vulnerability Opens

Roundcube, a leading open-source webmail solution, has pushed out critical security updates. These updates resolve a privacy bypass vulnerability. The flaw detailed by NULL CATHEDRAL allowed...

Marcus Rodriguez
Marcus Rodriguez
February 9, 2026 2 Min Read
5 0

Roundcube, a leading open-source webmail solution, has pushed out critical security updates. These updates resolve a privacy bypass vulnerability.

The flaw detailed by NULL CATHEDRAL allowed attackers to load remote images and track email opens, even when users had explicitly configured their settings to “Block remote images.”

The vulnerability affects Roundcube Webmail versions prior to 1.5.13 and all 1.6.x versions prior to 1.6.13. The maintainers have released versions 1.5.13 and 1.6.13 to patch the issue, which was publicly disclosed on February 8, 2026.

The core of the issue lies in Roundcube’s HTML sanitizer, rcube_washtml, which is responsible for cleaning incoming email content to prevent Cross-Site Scripting (XSS) and privacy leaks.

When a user sets allow_remote to false, the sanitizer intercepts HTML attributes known to load external resources. Specifically, the function is_image_attribute() checks tags like <img>, <video>, and <use> for attributes that might trigger a network request (such as src or href). If matched, the URL is sanitized to ensure it is not external.

However, standard links (like <a href>) are processed differently. They pass through a function called wash_link(), which permits HTTP and HTTPS URLs so that users can click on legitimate hyperlinks.

The vulnerability arose because the sanitizer failed to classify the SVG element <feImage> as an image container.

The Exploit Mechanism

<feImage> is an SVG filter primitive that fetches image data from an external source using the href attribute. Because rcube_washtml did not include feimage in its blocklist for is_image_attribute(), the sanitizer treated the href essentially as a standard clickable link, reads NULL CATHEDRAL report.

Consequently, the malicious URL was routed to wash_link(), which allowed the external connection.

An attacker could exploit this by embedding an invisible 1×1 SVG in an email. Inside the SVG, a filter definition using <feImage> would automatically trigger a GET request to an attacker-controlled server as soon as the email was rendered.

This bypass defeats the privacy protections users rely on to prevent tracking pixels. By exploiting this flaw, threat actors could:

  • Confirm an email address is active.
  • Log the recipient’s IP address.
  • Fingerprint the victim’s browser and device.

The fix, implemented in commit 26d7677, updates the regex logic within is_image_attribute(). The sanitizer now explicitly recognizes feimage alongside image and use when inspecting href attributes. This ensures that any attempt to load external resources via SVG filters is caught and blocked by the strict image sanitization rules.

Administrators running self-hosted instances of Roundcube are urged to upgrade to version 1.5.13 or 1.6.13 immediately to protect user privacy.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitPatchSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

ScarCruft Abuses Cloud Services & OLE to Legitimate OLE-based

Next Post

DKIM Replay Attacks Target Apple & PayPal Invoice Hackers Exploit

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us