Free and open source webmail software for the masses, written in PHP

Roundcube Webmail

Roundcube Webmail 1.4.12

  -  6.7 MB  -  Open Source

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Roundcube Webmail 1.4.12.


For those interested in downloading the most recent release of Roundcube Webmail or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • Roundcube Webmail 1.4.12 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Roundcube Webmail 1.4.12 Screenshot 1
  • Roundcube Webmail 1.4.12 Screenshot 2
  • Roundcube Webmail 1.4.12 Screenshot 3
  • Roundcube Webmail 1.4.12 Screenshot 4
  • Roundcube Webmail 1.4.12 Screenshot 5

What's new in this version:

Fixed:
- XSS issue in handling attachment filename extension in mimetype mismatch warning
- possible SQL injection via some session variables
- Enigma: Fix bug where signature verification could fail for non-ascii bodies
- bug where contacts search didn't work with addressbook_search_mods set to an empty array
- bug causing some HTML message content to be not centered in Elastic skin
- bug where consecutive LDAP searches could return wrong results
- bug where plus characters in attachment filename could have been ignored
- displaying HTML body with inline images encapsulated using TNEF format (winmail.dat)
- handling of custom sender addresses with names
- shift + drag'n'drop menu not working in Elastic skin with Chrome browser
- Firefox infinite loading display on mail screen
- XSS issue in handling attachment filename extension in mimetype mismatch warning
- SQL injection via some session variables