Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical RoundCube Webmail Flaws Actively Exploited

Critical RoundCube Webmail Flaws Actively Exploited

Posted on February 23, 2026 By CWS

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about the active exploitation of two vulnerabilities in the popular RoundCube Webmail application. These vulnerabilities have been exploited in real-world attacks, posing significant risks to both government and enterprise networks.

Details on the Vulnerabilities

RoundCube Webmail, a widely used email client, has become a target for cybercriminals. The exploitation of its vulnerabilities soon after their public disclosure is a notable trend. One such vulnerability, identified as CVE-2025-49113, is a critical post-authentication remote code execution (RCE) flaw. This vulnerability, which scored 9.9 in the Common Vulnerability Scoring System (CVSS), was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog recently.

The RCE issue affects all RoundCube versions from 1.1.0 to 1.6.10, allowing malicious actors to inject harmful data into active sessions by embedding payloads in file names. Although the defect was patched on June 1, 2025, attackers quickly developed exploit code, leveraging brute force techniques to gain necessary credentials.

Additional Vulnerability in Focus

In addition to CVE-2025-49113, another vulnerability, CVE-2025-68461, has been actively exploited. This high-severity flaw, addressed in December 2025, involves a cross-site scripting (XSS) issue. The vulnerability, which has a CVSS score of 7.2, could be exploited using the animate tag in an SVG document within Webmail versions 1.6.12 and 1.5.12.

The affected versions failed to properly sanitize malicious payloads embedded in the animate tag, enabling attackers to execute arbitrary code in the victim’s browser session without any user interaction.

Urgent Action Required

CISA has urgently advised federal agencies to work on patching these RoundCube vulnerabilities within a three-week timeframe, as directed by Binding Operational Directive 22-01. It is crucial for all organizations to consult CISA’s KEV catalog and prioritize the remediation of the security issues listed.

Effective patch management and timely updates are essential to mitigate the risks associated with these vulnerabilities. Organizations should ensure that all deployed software versions are up-to-date and secure against potential exploitation.

Staying informed about newly discovered vulnerabilities and promptly applying patches can significantly reduce the risk of cyber attacks targeting key systems and data.

Security Week News Tags:CISA, Cybersecurity, Exploits, RCE, Roundcube, security patches, Software Security, Vulnerabilities, Webmail, XSS

Post navigation

Previous Post: Google Restricts OpenClaw Access Due to OAuth Token Misuse
Next Post: North Korean Cybercriminals Intensify Crypto Attacks

Related Posts

vBulletin Vulnerability Exploited in the Wild vBulletin Vulnerability Exploited in the Wild Security Week News
Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’ Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’ Security Week News
Asymmetric Security Emerges From Stealth With .2 Million in Funding Asymmetric Security Emerges From Stealth With $4.2 Million in Funding Security Week News
Microsoft to Update Windows Secure Boot in 2026 Microsoft to Update Windows Secure Boot in 2026 Security Week News
Over 300,000 Individuals Impacted by Vitas Hospice Data Breach Over 300,000 Individuals Impacted by Vitas Hospice Data Breach Security Week News
Tonic Security Launches With  Million in Seed Funding Tonic Security Launches With $7 Million in Seed Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lazarus Group Deploys Medusa Ransomware in Cyber Attacks
  • Diesel Vortex Targets Logistics Sector, Steals Credentials
  • Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers
  • Effective Identity Risk Management in Modern Enterprises
  • New Malware Uses Fake CAPTCHAs to Steal Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lazarus Group Deploys Medusa Ransomware in Cyber Attacks
  • Diesel Vortex Targets Logistics Sector, Steals Credentials
  • Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers
  • Effective Identity Risk Management in Modern Enterprises
  • New Malware Uses Fake CAPTCHAs to Steal Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News