Severe 10-Year-Old Roundcube Webmail Bug Lets Authenticated Users Execute Malicious Code

Published:

spot_img

Critical Vulnerability Discovered in Roundcube Webmail Software

A Decade-Long Flaw Uncovered

Cybersecurity experts have recently brought to light a significant security weakness in the Roundcube webmail platform that has eluded detection for nearly ten years. This vulnerability poses serious risks as it can be exploited by attackers to take control of affected systems and execute arbitrary code.

Overview of the Vulnerability

Identified as CVE-2025-49113, this flaw has a remarkable CVSS score of 9.9 out of 10, indicating its severity. Described as a case of post-authenticated remote code execution through PHP object deserialization, the issue is particularly concerning because it allows authenticated users to execute harmful code remotely.

The National Institute of Standards and Technology (NIST) details that “Roundcube Webmail versions prior to 1.5.10 and 1.6.x before 1.6.11 permit remote code execution by authenticated users due to a lack of validation of the _from parameter in the URL within the program/actions/settings/upload.php file.”

Affected Versions and Remediation

This vulnerability affects all versions before and including 1.6.10. Fortunately, it has been addressed in the newly released versions 1.6.11 and 1.5.10 LTS. Kirill Firsov, the founder and CEO of FearsOff, is credited with discovering and reporting this significant flaw.

Insights from the Cybersecurity Community

FearsOff, based in Dubai, has issued a brief advisory indicating its plans to disclose more technical specifics and a proof-of-concept (PoC) in the near future. This move is intended to give users ample time to implement the necessary security patches before further information is revealed.

Previous Threats and Exploits

Roundcube has previously been targeted by state-sponsored threat actors, including groups like APT28 and Winter Vivern. Last year, Positive Technologies reported efforts by unidentified hackers attempting to exploit a Roundcube vulnerability (CVE-2024-37383) in a phishing campaign aimed at stealing user credentials.

Moreover, just a few weeks ago, ESET revealed that APT28 had exploited cross-site scripting (XSS) vulnerabilities in various webmail services, such as Roundcube, Horde, MDaemon, and Zimbra. These malicious activities were primarily aimed at harvesting sensitive data from email accounts linked to governmental entities and defense contractors in Eastern Europe.

Importance of Timely Updates

The detection of this critical vulnerability is a stark reminder of the ongoing risks faced by users of webmail services. Keeping software updated is fundamental in safeguarding against potential exploits and cyberattacks. Users are strongly encouraged to promptly upgrade to the latest versions of Roundcube to mitigate any risks associated with this vulnerability.

Keeping Informed

For ongoing updates and in-depth analyses of cybersecurity issues, following reputable sources is essential. Platforms like Twitter and LinkedIn often share exclusive content on the latest security vulnerabilities and best practices for protection.

By staying informed and vigilant, users can better protect their data and systems from increasingly sophisticated cyber threats.

spot_img

Related articles

Recent articles

Discover Six Flags Qiddiya: Opening Date, Ticket Prices, and 28 Record-Breaking Rides

Discovering Qiddiya City: A New Era of Entertainment An Overview of Qiddiya City Nestled in the stunning Tuwaiq Mountains and just a 40-minute drive from Riyadh,...

Five Plead Guilty for Aiding North Korean Hackers in Breaching 136 Companies

U.S. Justice Department Takes Action Against North Korean Fraud Network On Friday, the U.S. Department of Justice (DoJ) announced significant developments in the ongoing fight...

127 Organizations Rally Against Proposed Changes to GDPR and EU Data Protection Laws

A coalition of 127 civil society organizations and trade unions has come together to express their opposition to proposed modifications that they...

Washington Post Confirms Data Breach: CL0P Claims Over 40 Oracle Targets

The Washington Post has confirmed that it recently suffered a data breach linked to a concentrated threat campaign exploiting vulnerabilities...