In Roundcube from version 1.2.0 to 1.3.5, with the archive plugin ebabled and configured, it's possible to exploit the unsanitized, user-controlld '_uid' parameter injection attack by placing an IMAP command after a %d%0a seqebce. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None