June 10 Advisory: Roundcube Webmail Vulnerable to Authenticated RCE [CVE-2025-49113]

Rapid Response

Vulnerability Description

CVE-2025-49113 is a critical vulnerability (CVSS 9.9) affecting Roundcube Webmail versions prior to 1.5.10 and 1.6.x prior to 1.6.11. It allows authenticated attackers to achieve remote code execution (RCE) due to improper input validation of the _from parameter in the program/actions/settings/upload.php endpoint, leading to PHP Object Deserialization.

Screenshot-2025-06-09-at-11.19.44-AM.png
Example Exposed Roundcube Webmail Host

Threat Activity

While there is no confirmed evidence of CVE-2025-49113 being actively exploited at the time of writing, CERT Polska has observed exploitation attempts targeting a separate Roundcube vulnerability, CVE-2024-42009, in ongoing spearphishing campaigns. Given that a public proof-of-concept (PoC) for CVE-2025-49113 is available, prompt patching is strongly advised.

FieldDetails
CVE-IDCVE-2025-49113 – CVSS 9.9 (Critical) – assigned by MITRE
Vulnerability DescriptionAuthenticated RCE due to improper input validation of the _from parameter in program/actions/settings/upload.php
Date of DisclosureJune 1, 2025 
Date Reported as Actively ExploitedN/A 
Affected Assetsprogram/actions/settings/upload.php of Roundcube Webmail fails to validate _from parameter
Vulnerable Software Versions Roundcube Webmail versions prior to 1.5.10 and 1.6.x prior to 1.6.11.
PoC Available?Public exploit code has been published on GitHub. 
Exploitation StatusThere is no evidence that this vulnerability is being actively exploited at the time of writing. 
Patch StatusThis vulnerability has been patched in versions 1.5.10 and 1.6.11 of Roundcube Webmail. 

Censys Perspective

At the time of writing, Censys observed 2,473,116 exposed Roundcube Webmail instances online, nearly all of which are exposing version information. The versions in the table below were observed most frequently: 

The queries below can be used to identify exposed instances of Roundcube Webmail, but they are not necessarily vulnerable to the exploit. 

Censys Platform Query:

web.software: (vendor: "roundcube" and product: "webmail")

Censys Legacy Search Query:

services.software: (vendor="Roundcube" and product="Webmail")

Censys ASM Query:

host.services.software: (vendor="Roundcube" and product="Webmail") or web_entity.instances.software: (vendor="Roundcube" and product="Webmail")

The query below can be used to find instances of Roundcube Webmail that are vulnerable to the exploit. Please note that this risk was recently deployed and results may take up to 24 hours to fully propagate. 

Censys ASM Risk Query:

risks.name = "Vulnerable Roundcube [CVE-2025-49113]"
roundcube.png
Map of Exposed Roundcube Webmail Instances

References

Subscribe to our blog