HomeCyber SecurityVital 10-12 months-Previous Roundcube Webmail Bug Permits Authenticated Customers Run Malicious Code

Vital 10-12 months-Previous Roundcube Webmail Bug Permits Authenticated Customers Run Malicious Code


Jun 03, 2025Ravie LakshmananElectronic mail Safety / Vulnerability

Vital 10-12 months-Previous Roundcube Webmail Bug Permits Authenticated Customers Run Malicious Code

Cybersecurity researchers have disclosed particulars of a crucial safety flaw within the Roundcube webmail software program that has gone unnoticed for a decade and could possibly be exploited to take over prone methods and execute arbitrary code.

The vulnerability, tracked as CVE-2025-49113, carries a CVSS rating of 9.9 out of 10.0. It has been described as a case of post-authenticated distant code execution by way of PHP object deserialization.

“Roundcube Webmail earlier than 1.5.10 and 1.6.x earlier than 1.6.11 permits distant code execution by authenticated customers as a result of the _from parameter in a URL is just not validated in program/actions/settings/add.php, resulting in PHP Object Deserialization,” reads the description of the flaw within the NIST’s Nationwide Vulnerability Database (NVD).

The shortcoming, which impacts all variations of the software program earlier than and together with 1.6.10, has been addressed in 1.6.11 and 1.5.10 LTS. Kirill Firsov, founder and CEO of FearsOff, has been credited with discovering and reporting the flaw.

Cybersecurity

The Dubai-based cybersecurity firm famous in a quick advisory that it intends to make public extra technical particulars and a proof-of-concept (PoC) “quickly” in order to offer customers enough time to use the required patches.

Beforehand disclosed safety vulnerabilities in Roundcube have been a profitable goal for nation-state menace actors like APT28 and Winter Vivern. Final yr, Optimistic Applied sciences revealed that unidentified hackers tried to use a Roundcube flaw (CVE-2024-37383) as a part of a phishing assault designed to steal person credentials.

Then a few weeks in the past, ESET famous that APT28 had leveraged cross-site scripting (XSS) vulnerabilities in numerous webmail servers akin to Roundcube, Horde, MDaemon, and Zimbra to reap confidential information from particular e-mail accounts belonging to governmental entities and protection corporations in Japanese Europe.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments