Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
History

Thu, 12 Jun 2025 16:30:00 +0000


Mon, 09 Jun 2025 04:30:00 +0000

Type Values Removed Values Added
References

Fri, 06 Jun 2025 19:00:00 +0000

Type Values Removed Values Added
Title roundcubemail: Remote Code Execution in Roundcube via Unvalidated _from Parameter
References
Metrics threat_severity

None

threat_severity

Critical


Mon, 02 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Jun 2025 18:30:00 +0000

Type Values Removed Values Added
References

Mon, 02 Jun 2025 12:45:00 +0000

Type Values Removed Values Added
References

Mon, 02 Jun 2025 04:45:00 +0000

Type Values Removed Values Added
Description Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-06-02T00:00:00.000Z

Updated: 2025-06-12T16:09:32.854Z

Reserved: 2025-06-02T00:00:00.000Z

Link: CVE-2025-49113

cve-icon Vulnrichment

Updated: 2025-06-09T03:27:58.478Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-02T05:15:53.420

Modified: 2025-06-12T17:15:29.310

Link: CVE-2025-49113

cve-icon Redhat

Severity : Critical

Publid Date: 2025-06-02T00:00:00Z

Links: CVE-2025-49113 - Bugzilla