Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code. https://nvd.nist.gov/vuln/detail/CVE-2023-5631 This CVE does not seem to be reported by glsa-check on a system with mail-client/roundcube-1.6.3 installed. mail-client/roundcube-1.6.4 is still showing as ~1.6.4
*** This bug has been marked as a duplicate of bug 916274 ***