Vulnerability Management

Actively exploited Roundcube flaw has widespread coverage

Debugging binary code with bug inside magnifying glass

BleepingComputer reports that attacks exploiting a critical remote code execution vulnerability in Roundcube webmail, tracked as CVE-2025-49113, could compromise 84,925 instances around the world.

The U.S. accounted for most of the vulnerable Roundcube webmail implementations at 19,500, followed by India, Germany, France, and Canada, according to The Shadowserver Foundation. Such a flaw, which arose from PHP object deserialization and session corruption caused by unsanitized $_GET['_from'] input, has been undetected for more than a decade and affects all Roundcube versions 1.1.0 to 1.6.10. With log scraping, brute-force, and cross-site request forgery attacks enabling credential theft while circumventing authentication, organizations have been urged to immediately update to versions 1.6.11 and 1.5.10 released earlier this month to prevent potential compromise. Such a threat could also be averted by those that cannot apply version upgrades by limiting webmail access, deactivating file uploads, and including CSRF defenses, as well as tracking exploit indicators and hindering risky PHP functionality.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds