CVE-2025-49113
Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 02, 2025
- Published Date
- June 02, 2025
- Last Updated
- June 12, 2025
- Vendor
- Roundcube
- Product
- Webmail
- Description
- Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
- Tags
- Score
- 30.94% (Percentile: 96.48%) as of 2025-06-13
- Exploitation
- poc
- Technical Impact
- total
- Exploited in the Wild
- Yes (2025-06-05 17:00:48 UTC) Source
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score
SSVC Information
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
BleepingComputer | 2025-06-05 17:00:41 UTC |
Recent Mentions
CVE-2025-49113: Proof of Concept Demonstrating Remote Code Execution Through Insecure Deserialization in Roundcube
Source: DarkWebInformer • Published: 2025-06-09 20:20:55 UTC
Over 84,000 Roundcube instances vulnerable to actively exploited flaw
Source: BleepingComputer • Published: 2025-06-09 20:14:16 UTC
Hacker selling critical Roundcube webmail exploit as tech info disclosed
Source: BleepingComputer • Published: 2025-06-05 16:55:54 UTC
Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code
Source: TheHackerNews • Published: 2025-06-03 13:01:00 UTC
[roundcube/roundcubemail] Roundcube Webmail Vulnerable to Authenticated RCE via PHP Object Deserialization
Source: Github Advisory Database (Composer) • Published: 2025-06-02 06:30:32 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-49113.yaml | 2025-06-05 23:30:24 UTC |
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel
-
Detected by Nuclei