<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>NULL CATHEDRAL - Email-Security</title><link>https://nullcathedral.com/tags/email-security/</link><description>Where nothing is sacred.</description><language>en-us</language><copyright>NULL CATHEDRAL</copyright><pubDate>Sun, 08 Feb 2026 00:00:00 +0000</pubDate><lastBuildDate>Sun, 15 Feb 2026 14:00:00 +0000</lastBuildDate><docs>https://www.rssboard.org/rss-specification</docs><ttl>60</ttl><atom:link href="https://nullcathedral.com/tags/email-security/feed.xml" rel="self" type="application/rss+xml"/><image><url>https://nullcathedral.com/favicon.svg</url><title>NULL CATHEDRAL</title><link>https://nullcathedral.com/</link></image><item><title>Roundcube Webmail &lt;1.5.13 / &lt;1.6.13 allows attackers to force remote image loads via SVG feImage</title><link>https://nullcathedral.com/posts/2026-02-08-roundcube-svg-feimage-remote-image-bypass/</link><description>Roundcube's HTML sanitizer doesn't treat SVG feImage href as an image source. Attackers can bypass remote image blocking to track email opens. (CVE-2026-25916)</description><category>vulnerability</category><category>roundcube</category><category>svg</category><category>email-security</category><guid isPermaLink="true">https://nullcathedral.com/posts/2026-02-08-roundcube-svg-feimage-remote-image-bypass/</guid><pubDate>Sun, 08 Feb 2026 00:00:00 +0000</pubDate></item></channel></rss>