Critical Security Flaw in Roundcube: Update Now

Roundcube Webmail has become one of the most widely adopted email clients globally, integrated seamlessly into esteemed web hosting solutions like cPanel, Plesk, ISPConfig, and DirectAdmin. Unfortunately, this popularity makes it a magnet for cyber threats. In recent developments, a severe security vulnerability with identification code CVE-2025-49113 has been discovered, posing significant risks to Roundcube’s estimated 53 million users worldwide. This flaw permits authenticated attackers to execute arbitrary code on compromised systems. Scoring an alarming 9.9 out of 10 on the Common Vulnerability Scoring System (CVSS), this decade-old issue originates from PHP object deserialization via the _from parameter located in the upload.php file. Leveraging this vulnerability, malicious users can alter the serialized PHP objects to facilitate unauthorized code execution, underscoring the urgency of addressing such potential exploitation promptly.

Urgent Update and Security Measures

Roundcube’s vulnerability has become a prime target for sophisticated threat actors like APT28 and Winter Vivern, known for exploiting such security gaps in phishing schemes and extracting vital information from defense and government sectors. Consequently, entities like the Centre for Cybersecurity Belgium have issued urgent calls for action, recommending the immediate updating and installation of Roundcube’s latest versions, specifically 1.6.11 and 1.5.10 LTS, to effectively counter these risks. Cybersecurity firm FearsOff uncovered this flaw, following a responsible disclosure strategy. They plan to share technical details and proof-of-concept code once users have had sufficient opportunity to secure their systems. Implementing prompt patches combined with enhanced monitoring can aid organizations in detecting and stopping potential exploitation attempts. Acknowledging the gravity of this vulnerability and its costly repercussions is vital. Rapid proactive steps are crucial to thwart further malicious actions, protecting system security and confidentiality.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later