![]() |
|
HackerOne Disclosed Reports - 2026-04-20 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2026-04-20 (/Thread-HackerOne-Disclosed-Reports-2026-04-20) |
HackerOne disclosed reports - 2026-04-20 - hashXploiter - 04-21-2026
Medium
resolved SVG filter primitives bypass remote image blocking, enabling email tracking without consent.Bug reported by _NULL was disclosed at April 20, 2026, 12:57 pm | Privacy Violation A vulnerability was discovered in the HTML sanitizer of the Roundcube webmail application. The sanitizer did not properly handle the `
Medium
resolved position: fixed !important bypasses CSS sanitizer's fixed-position mitigation, enabling full-viewport phishing overlays.Bug reported by _NULL was disclosed at April 20, 2026, 12:04 pm | Resource Injection A vulnerability was discovered in the CSS sanitization process of the Roundcube webmail application. The sanitizer failed to properly handle the "position: fixed !important" CSS declaration, allowing an attacker to bypass the mitigation for fixed-position overlays. This could enable the creation of full-viewport phishing overlays.
Medium
resolved Unquoted body background attribute enables CSS injection that bypasses remote image blockingBug reported by _NULL was disclosed at April 20, 2026, 12:03 pm | Resource Injection A vulnerability was discovered in Roundcube's HTML sanitizer that enabled CSS injection when the `allow_remote` option was set to `false`. The sanitizer failed to quote the value of the `background` attribute from the email's ` ` element, allowing a crafted `data:` URI to terminate the `url()` function and inject arbitrary CSS properties. This bypass allowed external resources to be loaded even when remote image blocking was enabled.
Medium
resolved SMIL values and by attributes bypass remote image blocking via unvalidated resource-loading animations, enabling email tracking without consentBug reported by _NULL was disclosed at April 20, 2026, 12:03 pm | Remote File Inclusion A vulnerability was discovered in the HTML sanitizer of the Roundcube webmail client. The vulnerability allowed attackers to bypass the "Block remote images" security feature by using SMIL animation attributes to load arbitrary external resources without validation. This could have enabled email tracking without the user's consent. |