Wiz Agents & Workflows are here

CVE-2020-12641
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2020-12641 is a remote code execution vulnerability discovered in Roundcube Webmail versions before 1.4.4. The vulnerability was disclosed on April 29, 2020, and affects the rcube_image.php component. The flaw allows attackers to execute arbitrary code via shell metacharacters in configuration settings for im_convert_path or im_identify_path (Roundcube News, NVD).

Technical details

The vulnerability exists in the rcube_image.php component where insufficient sanitization of the im_convert_path and im_identify_path configuration parameters allows command injection. The issue received a CVSS v3.1 base score of 9.8 (Critical) with attack vector: Network, attack complexity: Low, privileges required: None, user interaction: None, scope: Unchanged, and impact metrics all rated as High for confidentiality, integrity and availability (Ubuntu).

Impact

If successfully exploited, this vulnerability allows attackers to execute arbitrary system commands on the affected server. The impact is particularly severe as it can lead to complete system compromise through remote code execution. The vulnerability can be triggered when any user opens an email containing a non-standard image that requires conversion (DrunkenShells).

Mitigation and workarounds

The vulnerability was patched in Roundcube versions 1.4.4, 1.3.11, and 1.2.10. The fix implements proper shell command escaping using escapeshellcmd() for the convert and identify commands. Organizations should upgrade to these or later versions immediately. A bypass was later discovered, leading to additional fixes in versions 1.4.5 and 1.3.12 (Roundcube Commit, Roundcube News).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33986HIGH7.5
  • WolfiWolfi
  • freerdp2
NoYesMar 30, 2026
CVE-2026-33987HIGH7.1
  • WolfiWolfi
  • freerdp2
NoYesMar 30, 2026
CVE-2026-33995MEDIUM5.3
  • WolfiWolfi
  • libwinpr
NoYesMar 30, 2026
CVE-2026-34881MEDIUM5
  • Linux DebianLinux Debian
  • glance
NoYesMar 31, 2026
CVE-2026-33691N/AN/A
  • Linux DebianLinux Debian
  • modsecurity-crs
NoNoMar 31, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management