Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code

10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code

Posted on June 3, 2025June 3, 2025 By CWS

A decade-old crucial safety vulnerability has been found in Roundcube Webmail that might permit authenticated attackers to execute arbitrary code on susceptible programs, doubtlessly affecting thousands and thousands of installations worldwide.

The flaw, tracked as CVE-2025-49113, carries an alarming CVSS rating of 9.9 out of 10.0, marking it as one of the vital extreme vulnerabilities found in recent times.

The vulnerability impacts all Roundcube Webmail variations earlier than 1.5.10 and 1.6.x earlier than 1.6.11, representing a staggering scope of influence that features over 53 million hosts globally.

The flaw notably issues fashionable internet hosting management panels equivalent to cPanel, Plesk, ISPConfig, and DirectAdmin, which bundle Roundcube as their default webmail resolution.

10-Yr-Outdated Roundcube RCE Vulnerability

Kirill Firsov, founder and CEO of Dubai-based cybersecurity agency FearsOff, found this post-authenticated distant code execution vulnerability that exploits PHP object deserialization.

The safety flaw stems from inadequate validation of the _from parameter within the URL throughout the program/actions/settings/add.php file, enabling malicious customers to control serialized PHP objects and execute arbitrary code on the server.

Roundcube has traditionally been a primary goal for superior persistent risk teams. Earlier vulnerabilities within the webmail platform have been exploited by nation-state actors together with APT28 and Winter Vivern.

Final yr, unidentified hackers tried to use CVE-2024-37383 in phishing assaults geared toward stealing consumer credentials.

Extra lately, ESET researchers documented APT28’s exploitation of cross-site scripting vulnerabilities in numerous webmail servers, together with Roundcube, to reap confidential knowledge from governmental entities and protection firms in Japanese Europe.

The Centre for Cybersecurity Belgium has issued pressing warnings, strongly recommending that organizations set up updates with the very best precedence after thorough testing. Fastened variations at the moment are out there with Roundcube Webmail 1.6.11 and 1.5.10 LTS addressing the vulnerability.

FearsOff has indicated plans to publish complete technical particulars and proof-of-concept code “quickly,” following accountable disclosure practices to permit enough time for affected events to implement crucial patches.

This strategy demonstrates the cybersecurity group’s dedication to offering organizations ample time to safe their programs earlier than detailed exploitation strategies develop into public.

Organizations utilizing Roundcube Webmail ought to prioritize instant patching and implement enhanced monitoring capabilities to detect any suspicious actions which may point out tried exploitation of this crucial vulnerability.

Pace up and enrich risk investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:10YearOld, Attackers, Code, Execute, Malicious, RCE, Roundcube, Vulnerability

Post navigation

Previous Post: The UK Brings Cyberwarfare Out of the Closet
Next Post: Threat Modeling for DevSecOps Practical Guide

Related Posts

Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
Dark Web Job Market Evolved Dark Web Job Market Evolved Cyber Security News
Threat Actors Exploit AI Tool to Spread Infostealer Threat Actors Exploit AI Tool to Spread Infostealer Cyber Security News
North Korean Kimsuky and Lazarus Join Forces to Exploit Zero-Day Vulnerabilities Targeting Critical Sectors Worldwide North Korean Kimsuky and Lazarus Join Forces to Exploit Zero-Day Vulnerabilities Targeting Critical Sectors Worldwide Cyber Security News
Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark