Loading HuntDB...

CVE-2025-49113

CRITICAL
Published 2025-06-02T00:00:00.000Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-49113. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
9.9
/10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
Not Available
Attack Complexity
Not Available
Privileges Required
Not Available
User Interaction
Not Available
Scope
Not Available

Impact Metrics

Confidentiality
Not Available
Integrity
Not Available
Availability
Not Available

Description

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

Available Exploits

No exploits available for this CVE.

Related News

Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited

A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting over 80,000 servers. Threat actors exploited a critical remote code execution (RCE) flaw in Roundcube, tracked as CVE-2025-49113, just days after the p…

Securityaffairs.com 2025-06-11 11:39
Over 84,000 Roundcube instances vulnerable to actively exploited flaw

Over 84,000 instances of the Roundcube webmail software are vulnerable to CVE-2025-49113, a critical remote code execution (RCE) vulnerability with a publicly available exploit. [...]

BleepingComputer 2025-06-09 20:14
Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)

With an exploit for a critical Roundcube vulnerability (CVE-2025-49113) being offered for sale on underground forums and a PoC exploit having been made public, attacks exploiting the flaw are incoming and possibly already happening. According to the Shadowser…

Help Net Security 2025-06-09 12:06

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed CRITICAL

Roundcube Webmail Vulnerable to Authenticated RCE via PHP Object Deserialization

GHSA-8j8w-wwqc-x596

Advisory Details

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

Affected Packages

Packagist roundcube/roundcubemail
ECOSYSTEM: ≥0
Packagist roundcube/roundcubemail
ECOSYSTEM: ≥1.6.0

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: June 2, 2025, Modified: June 9, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

3 posts
Reddit 2 days, 15 hours ago
crstux
Exploit

🔥 Top 10 Trending CVEs (11/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-33053](https://nvd.nist.gov/vuln/detail/CVE-2025-33053)** - 📝 Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability - 📅 **Published:** 10/06/2025 - 📈 **CVSS:** 8.8 - 🛡️ **CISA KEV:** True - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C - …

1
1.0
View Original High Risk
Reddit 3 days, 7 hours ago
MauriceTorres
Exploit PoC

🚨 Today’s Patch Tuesday Overview: 66 vulnerabilities, including one zero-day **Microsoft** has addressed **66** vulnerabilities, including **one zero-day** vulnerability, nine critical ones, and **one** **with** **proof of concept** (PoC). **Third-party:** web browsers, Android, Roundcube, Cisco, HPE, Ivanti, and processors. 📢 Navigate to [**Vulnerability Digest from Action1**](https://www.action1.com/patch-tuesday/patch-tuesday-june-2025/?vyr) for a comprehensive summary …

2
2.0
View Original High Risk
Reddit 3 days, 8 hours ago
crstux
Exploit

🔥 Top 10 Trending CVEs (10/06/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-3721](https://nvd.nist.gov/vuln/detail/CVE-2024-3721)** - 📝 A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classified as critical. This issue affects some unknown processing of the file /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___. The manipulation …

2
2.0
View Original High Risk

References

Published: 2025-06-02T00:00:00.000Z
Last Modified: 2025-06-11T04:01:26.166Z
Copied to clipboard!