Cybersecurity researchers have disclosed particulars of a vital security flaw within the Roundcube webmail software program that has gone unnoticed for a decade and might be exploited to take over inclined programs and execute arbitrary code.
The vulnerability, tracked as CVE-2025-49113, carries a CVSS rating of 9.9 out of 10.0. It has been described as a case of post-authenticated distant code execution through PHP object deserialization.
“Roundcube Webmail earlier than 1.5.10 and 1.6.x earlier than 1.6.11 permits distant code execution by authenticated customers as a result of the _from parameter in a URL isn’t validated in program/actions/settings/add.php, resulting in PHP Object Deserialization,” reads the outline of the flaw within the NIST’s Nationwide Vulnerability Database (NVD).
The shortcoming, which impacts all variations of the software program earlier than and together with 1.6.10, has been addressed in 1.6.11 and 1.5.10 LTS. Kirill Firsov, founder and CEO of FearsOff, has been credited with discovering and reporting the flaw.

The Dubai-based cybersecurity firm famous in a quick advisory that it intends to make public further technical particulars and a proof-of-concept (PoC) “quickly” in order to offer customers adequate time to use the required patches.
Beforehand disclosed security vulnerabilities in Roundcube have been a profitable goal for nation-state risk actors like APT28 and Winter Vivern. Final yr, Constructive Applied sciences revealed that unidentified hackers tried to take advantage of a Roundcube flaw (CVE-2024-37383) as a part of a phishing assault designed to steal consumer credentials.
Then a few weeks in the past, ESET famous that APT28 had leveraged cross-site scripting (XSS) vulnerabilities in varied webmail servers akin to Roundcube, Horde, MDaemon, and Zimbra to reap confidential knowledge from particular e-mail accounts belonging to governmental entities and protection firms in Japanese Europe.