AI description
CVE-2025-49113 is a remote code execution vulnerability affecting Roundcube Webmail versions before 1.5.10 and 1.6.x before 1.6.11. It stems from the insufficient validation of the `_from` parameter in the `program/actions/settings/upload.php` file. This lack of validation allows for PHP Object Deserialization, potentially enabling authenticated users to execute arbitrary code on the Roundcube Webmail server. The vulnerability has been addressed in Roundcube Webmail versions 1.5.10 and 1.6.11.
- Description
- Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 9.9
- Impact score
- 6
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- cve@mitre.org
- CWE-502
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
43
CVE-2025-49113 (CVSS:9.9, CRITICAL) is Awaiting Analysis. Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the ..https://t.co/Amq8Ti4UOo #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
7 Jun 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
why you'd allow 'proc_open' on your webmail client in the first place? (like pretty much every webmail client in existence) CVE-2025-49113 - obv roundcube can run as a unikernel - https://t.co/7R03dCfjHH it's only "weaponized" if you let it
@nanovms
7 Jun 2025
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 We've added a new signature to our Suricata ruleset for the critical vulnerability CVE-2025-49113 in Roundcube, previously reproduced by @ptswarm. This RCE vulnerability potentially exposes millions of hosts worldwide. Update your rules now: https://t.co/Bom73mlzFQ #Suricata
@AttackDetection
6 Jun 2025
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Roundcube Risks CVE-2025-49113 vul analysis https://t.co/kvX9t6ymid CVE-2024-42009 https://t.co/GPyhSCFihi https://t.co/quZm7j9sZr
@blackorbird
6 Jun 2025
904 Impressions
2 Retweets
2 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨Alert: Positive Technologies has confirmed the deadly CVE-2025-49113 exploit—authenticated users can run arbitrary commands through PHP object deserialization. Read: https://t.co/QGsfVjdIAS Action: Update Roundcube immediately to the latest version.
@TheHackersNews
6 Jun 2025
9433 Impressions
19 Retweets
31 Likes
3 Bookmarks
0 Replies
2 Quotes
CVE-2025-49113: Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.. https://t.co/nMsi4hb9g
@cyber_advising
6 Jun 2025
993 Impressions
3 Retweets
14 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 A Critical Vulnerability exists in Roundcube Webmail (CVE-2025-49113). Please see the @ncsc_gov_ie advisory for more info: https://t.co/OHM1O1Dw1E
@ncsc_gov_ie
6 Jun 2025
141 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
В продаже появился эксплоит для критической уязвимости в Roundcube Эксперты предупреждают, что хакеры начинают эксплуатировать свежую уязвимость (CVE-2025-49113)
@XakepRU
6 Jun 2025
545 Impressions
1 Retweet
2 Likes
2 Bookmarks
0 Replies
0 Quotes
ハッカーがRoundcubeウェブメールの致命的な脆弱性を販売、技術情報も明らかに(CVE-2025-49113) https://t.co/oRd8HnxjyC #Security #セキュリティ #ニュース
@SecureShield_
6 Jun 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Hackers are exploiting CVE-2025-49113, a critical vulnerability in Roundcube versions 1.1.0-1.6.10, enabling remote code execution. Exploits are being sold quickly after reveal. Stay alert! 🔒 #Email #Hacking #Australia https://t.co/QRugMBgAhV
@TweetThreatNews
6 Jun 2025
57 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
2025-06-05 の人気記事はコチラでした。(自動ツイート) #Hacker_Trends ――― Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization [CVE-2025-49113] https://t.co/2JQjXZCuzG https://t.co/9pwUJTT8xC
@motikan2010
6 Jun 2025
194 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-49113 - critical 🚨 Roundcube Webmail - Remote Code Execution > Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution ... 👾 https://t.co/ohT0mih1ej @pdnuclei #NucleiTemplates #cve
@pdnuclei_bot
6 Jun 2025
188 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 CVE-2025-49113 – Authenticated RCE in Roundcube via unsafe deserialization in upload.php (via @FearsOff) PoC-based detection template and full details in comments. https://t.co/W1MG1NbeqM
@pdnuclei
5 Jun 2025
18802 Impressions
60 Retweets
255 Likes
112 Bookmarks
2 Replies
0 Quotes
Hackers are likely starting to exploit CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows remote execution. https://t.co/aHd0TFwutV https://t.co/Kv6fCcA5O8
@ngnicky
5 Jun 2025
186 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49113, a critical vulnerability in Roundcube webmail affecting versions 1.1.0 to 1.6.10, allows remote code execution. Exploitation is occurring rapidly following a patch, with exploits available on hacker forums. #Security https://t.co/6cJQuVTS2P
@Strivehawk
5 Jun 2025
79 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Webmail Threat: #CVE-2025-49113 Exploitation in Roundcube Webmail Goes Live https://t.co/N3mZZ36MdR
@UndercodeNews
5 Jun 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical vulnerability (CVE-2025-49113) in the widely used Roundcube webmail application is now being exploited by hackers, allowing for remote execution. Stay informed about this significant threat and the implications it carries. Read more: https://t.co/ECTwFsF70T
@trubetech
5 Jun 2025
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Roundcube ≤ 1.6.10 Post-Auth RCE CVE-2025-49113 https://t.co/eRFsIIYVvp
@crawopeucefau
5 Jun 2025
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 Critical flaw in Roundcube webmail software, undetected for 10 years, allows attackers to execute arbitrary code. CVE-2025-49113 scores 9.9 on CVSS. #CyberSecurity #Roundcube https://t.co/NcMLamOand https://t.co/NThZpNB841
@CyberHub_blog
5 Jun 2025
143 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49113 is a fascinating PHP Object injection in Roundcube webmail, a really nice find by the original finder. #roundcube #cve-2025-49113 #rce https://t.co/skfnfvDbaA
@httpvoid0x2f
5 Jun 2025
2574 Impressions
13 Retweets
46 Likes
14 Bookmarks
1 Reply
0 Quotes
My research on CVE-2025-49113 is out. https://t.co/kuLczCSv6V. Happy reading! #CVE #roundcube #poc @FearsOff https://t.co/p59xHaDo7S
@k_firsov
5 Jun 2025
14646 Impressions
69 Retweets
231 Likes
100 Bookmarks
4 Replies
3 Quotes
Olm CVE-2025-49113 nasıl object deserialization büyücü müsünüz ya https://t.co/VEkXFjy496
@luminaryxd
4 Jun 2025
3163 Impressions
0 Retweets
40 Likes
24 Bookmarks
1 Reply
0 Quotes
Critical 10-Year-Old Roundcube Webmail Vulnerability Allows Authenticated Users to Execute Malicious Code CVE-2025-49113 (CVSS 9.9), a critical flaw in Roundcube webmail allows authenticated users to execute arbitrary code via PHP object deserialization. The vulnerability, https
@dCypherIO
4 Jun 2025
182 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidad en el correo web de Roundcube ❗CVE-2025-49113 ➡️Más info: https://t.co/wuQEktyYnI https://t.co/f5xUYjZPSq
@CERTpy
4 Jun 2025
268 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
NIST je 2.6. 2025 izdal obvestilo o kritični ranljivosti CVE-2025-49113 sistema Roundcube Webmail. Proof-of-concept koda za izrabo ranljivosti je že javno objavljena, zato svetujemo takojšnje ukrepanje. https://t.co/CHrpCX2ZS2 https://t.co/WruuW41WOt
@sicert
4 Jun 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The exploit for CVE-2025-49113 is already available for sale on the dark web. I feel sorry for anyone who hasn’t upgraded to the newest version yet. Doomsday is coming, believe me. #roundcube #CVE @FearsOff https://t.co/znwBUUU3Rg
@k_firsov
4 Jun 2025
5238 Impressions
10 Retweets
39 Likes
8 Bookmarks
1 Reply
0 Quotes
🚨 CVE Alert: Critical Roundcube Webmail Remote Code Execution Vulnerability🚨 Vulnerability Details: CVE-2025-49113 (CVSS 9.9/10) Roundcube Webmail Remote Code Execution Vulnerability Impact: A successful exploit may allow authenticated users can potentially execute arbitr
@CyberxtronTech
4 Jun 2025
239 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Roundcube Webmail、認証ユーザーによる悪意のあるコード実行を許す10年以上の重大なバグ発見(CVE-2025-49113) https://t.co/JZPpWXSH4P #Security #セキュリティ #ニュース
@SecureShield_
4 Jun 2025
151 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I've created a script to detect CVE-2025-49113 based on versions exposed in the html body: https://t.co/wmWVLbjaUL Use at your own risk. https://t.co/qic5IdtURR
@rxerium
3 Jun 2025
7 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
A critical vulnerability in Roundcube, CVE-2025-49113, allows authenticated users to execute malicious code due to insecure _from parameter validation. Fixes released in versions 1.6.11 & 1.5.10 LTS. 🚨 #Webmail #Security #UK https://t.co/ToTwoL9sCB
@TweetThreatNews
3 Jun 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ We’ve reproduced CVE-2025-49113 in Roundcube. This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization. If you're running Roundcube — update immediately! https://t.co/iv3L56TRUB
@ptswarm
3 Jun 2025
29175 Impressions
93 Retweets
404 Likes
210 Bookmarks
7 Replies
7 Quotes
If you’re using cPanel, Plesk, ISPConfig, or DirectAdmin, you’re likely in the line of fire for CVE-2025-49113 – all of them bundle Roundcube by default. If your server/website exposes any of these ports: 2083, 2086, 2087, or 2096, you’re vulnerable. #CVE #roundcube @Fear
@k_firsov
3 Jun 2025
4061 Impressions
9 Retweets
41 Likes
32 Bookmarks
4 Replies
1 Quote
🚨 A 10-year-old flaw (CVE-2025-49113 / CVSS 9.9) in Roundcube Webmail could let hackers take over your system. Nation-state groups like APT28 have already exploited Roundcube before. 🔗 Read: https://t.co/BMAtVUugBR... https://t.co/WQ4wVEqrVx
@IT_news_for_all
3 Jun 2025
119 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 A 10-year-old flaw (CVE-2025-49113 / CVSS 9.9) in Roundcube Webmail could let hackers take over your system. Nation-state groups like APT28 have already exploited Roundcube before. 🔗 Read: https://t.co/QGsfVjdaLk 🔧 Patch to 1.6.11 or 1.5.10 LTS now. 📌 PoC coming
@TheHackersNews
3 Jun 2025
12987 Impressions
58 Retweets
110 Likes
16 Bookmarks
4 Replies
0 Quotes
CVE-2025-49113: RCE in Roundcube Webmail, 9.9 rating 🔥 Vuln in Roundcube allows attackers to perform RCE due to the lack of validation of the _from parameter. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/cqoQWhjF3E #cybersecurity #vulnerability_map https://t.c
@Netlas_io
3 Jun 2025
773 Impressions
3 Retweets
7 Likes
2 Bookmarks
0 Replies
0 Quotes
⚠️ Critical Roundcube Vulnerability Enables Remote Code Execution via Deserialization Flaw 💻A newly discovered flaw (CVE-2025-49113) in Roundcube Webmail allows authenticated users to execute arbitrary code via an unvalidated `_from` parameter. Affected versions must be
@threatsbank
2 Jun 2025
103 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49113 Remote Code Execution in Roundcube Webmail via Unsafe Parameter Deserialization https://t.co/ctsS5iPRKh
@VulmonFeeds
2 Jun 2025
135 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49113 Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in p… https://t.co/YzlXsBuEpB
@CVEnew
2 Jun 2025
706 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-49113: CRITICAL] Vulnerability in Roundcube Webmail versions before 1.5.10 and 1.6.x before 1.6.11 could allow authenticated users to execute remote code due to improper validation of the _from par...#cve,CVE-2025-49113,#cybersecurity https://t.co/VXYEaiQIck https://t.c
@CveFindCom
2 Jun 2025
95 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes