Severe 10-Year-Old Roundcube Webmail Bug Lets Authenticated Users Execute Malicious Code

Published:

spot_img

Critical Vulnerability Discovered in Roundcube Webmail Software

A Decade-Long Flaw Uncovered

Cybersecurity experts have recently brought to light a significant security weakness in the Roundcube webmail platform that has eluded detection for nearly ten years. This vulnerability poses serious risks as it can be exploited by attackers to take control of affected systems and execute arbitrary code.

Overview of the Vulnerability

Identified as CVE-2025-49113, this flaw has a remarkable CVSS score of 9.9 out of 10, indicating its severity. Described as a case of post-authenticated remote code execution through PHP object deserialization, the issue is particularly concerning because it allows authenticated users to execute harmful code remotely.

The National Institute of Standards and Technology (NIST) details that “Roundcube Webmail versions prior to 1.5.10 and 1.6.x before 1.6.11 permit remote code execution by authenticated users due to a lack of validation of the _from parameter in the URL within the program/actions/settings/upload.php file.”

Affected Versions and Remediation

This vulnerability affects all versions before and including 1.6.10. Fortunately, it has been addressed in the newly released versions 1.6.11 and 1.5.10 LTS. Kirill Firsov, the founder and CEO of FearsOff, is credited with discovering and reporting this significant flaw.

Insights from the Cybersecurity Community

FearsOff, based in Dubai, has issued a brief advisory indicating its plans to disclose more technical specifics and a proof-of-concept (PoC) in the near future. This move is intended to give users ample time to implement the necessary security patches before further information is revealed.

Previous Threats and Exploits

Roundcube has previously been targeted by state-sponsored threat actors, including groups like APT28 and Winter Vivern. Last year, Positive Technologies reported efforts by unidentified hackers attempting to exploit a Roundcube vulnerability (CVE-2024-37383) in a phishing campaign aimed at stealing user credentials.

Moreover, just a few weeks ago, ESET revealed that APT28 had exploited cross-site scripting (XSS) vulnerabilities in various webmail services, such as Roundcube, Horde, MDaemon, and Zimbra. These malicious activities were primarily aimed at harvesting sensitive data from email accounts linked to governmental entities and defense contractors in Eastern Europe.

Importance of Timely Updates

The detection of this critical vulnerability is a stark reminder of the ongoing risks faced by users of webmail services. Keeping software updated is fundamental in safeguarding against potential exploits and cyberattacks. Users are strongly encouraged to promptly upgrade to the latest versions of Roundcube to mitigate any risks associated with this vulnerability.

Keeping Informed

For ongoing updates and in-depth analyses of cybersecurity issues, following reputable sources is essential. Platforms like Twitter and LinkedIn often share exclusive content on the latest security vulnerabilities and best practices for protection.

By staying informed and vigilant, users can better protect their data and systems from increasingly sophisticated cyber threats.

spot_img

Related articles

Recent articles

GCCA Celebrates Supreme Council’s Decision to Create GCC Civil Aviation Authority

GCC Civil Aviation Authority: A New Era for Gulf Air Travel A Significant Development for the Gulf Region The General Civil Aviation Authority (GCAA) of the...

Researchers Find Over 30 Vulnerabilities in AI Coding Tools That Risk Data Theft and RCE Attacks

Unveiling the IDEsaster: Security Flaws in AI-Powered Coding Environments Overview of Recent Vulnerabilities A recent investigation has uncovered over 30 security vulnerabilities lurking within popular AI-powered...

XIXILI Transforms Plus-Size Lingerie in Malaysia

## A New Era for Plus Size Lingerie: Introducing XIXILI’s Collection ### Redefining Lingerie Shopping KUALA LUMPUR, MALAYSIA - In a bold move that reshapes the...

LockBit Ransomware Strikes Again: New Data Leak Site and 7 Victims Targeted

The Resurgence of LockBit Ransomware Group: New Developments and Victims The LockBit ransomware group, once a dominant player in the cybercrime arena, is beginning to...