Critical 10-Year Vulnerability in Roundcube Webmail Allows Code Execution by Authenticated Users

On June 3, 2025, cybersecurity researchers revealed a significant security flaw in Roundcube webmail software, active for a decade, that could enable authenticated users to execute malicious code on vulnerable systems. Classified as CVE-2025-49113, the vulnerability has a CVSS score of 9.9 out of 10, highlighting its severity. It involves post-authentication remote code execution through PHP object deserialization. According to the National Vulnerability Database (NVD), “Roundcube Webmail versions before 1.5.10 and 1.6.x prior to 1.6.11 allow authenticated users to execute remote code due to the lack of validation for the _from parameter in the URL in program/actions/settings/upload.php.” This flaw affects all versions up to and including 1.6.10 but has been patched in versions 1.6.11 and 1.5.10 LTS. The vulnerability was discovered and reported by Kirill Firsov, founder and CEO of FearsOff.

Critical Vulnerability in Roundcube Webmail Exposes Systems to Remote Code Execution

On June 3, 2025, cybersecurity researchers revealed a significant security vulnerability in the Roundcube webmail software, a flaw that has remained undetected for a decade. This vulnerability has the potential to be exploited by authenticated users, compromising affected systems and allowing for the execution of arbitrary code. The security issue, identified as CVE-2025-49113, has been assigned an alarming CVSS score of 9.9 out of 10.0, underscoring its severity.

The vulnerability arises from a lack of validation for the “_from” parameter in a specific URL within the program’s upload settings file, actions/settings/upload.php. This oversight facilitates post-authentication remote code execution through PHP object deserialization, making it particularly concerning as it can be triggered by users who are already authenticated within the system. The flaw affects all versions of Roundcube prior to and including 1.6.10, and it has been rectified in versions 1.6.11 and 1.5.10 LTS.

The implications of such a vulnerability are vast, as any authenticated user could potentially manipulate the underlying systems for malicious purposes. Kirill Firsov, founder and CEO of FearsOff, is credited with discovering this critical flaw, prompting the urgent need for organizations using Roundcube to update their software to secure their environments.

The targeted audience primarily includes organizations that rely on Roundcube for their webmail solutions. While specific organizations are not disclosed, the vulnerability poses risks to any business utilizing this software, and its implications extend across sectors where digital communication is essential.

In terms of potential attack vectors, the MITRE ATT&CK framework provides insights into the tactics that adversaries may exploit in such scenarios. Initial access could be gained through valid credentials, leveraging the authenticated state to execute arbitrary code. Persistence might be established if the vulnerability were used to implant additional malicious payloads or scripts within the compromised environment. Such actions could further escalate privileges and allow attackers to maintain a foothold within the affected systems.

Organizations are urged to review their Roundcube installations critically and ensure that they are operating on the latest secure versions. With cyber threats continually evolving, maintaining updated software and understanding the vulnerabilities inherent in widely-used applications like Roundcube is paramount for safeguarding sensitive information and maintaining operational integrity in today’s digital landscape.

Source link