CybersecurityNewswireTechnology

Roundcube RCE Flaw (CVE-2025-49113) Sparks Dark Web Attack Fears

▼ Summary

– A critical Roundcube vulnerability (CVE-2025-49113) is being actively exploited, with 84,000 unpatched installations globally, primarily in Europe, Asia, and North America.
– Roundcube is a widely used open-source webmail client, popular among academic institutions, governments, and hosting providers, making it a target for cyber espionage.
– CVE-2025-49113 is a PHP object deserialization flaw allowing remote code execution if attackers gain basic login access, affecting versions up to 1.5.9 and 1.6.0-1.6.10.
– The vulnerability was privately reported but weaponized quickly after the patch release, prompting the researcher to publish a PoC exploit to aid defenders.
– Users must upgrade to patched versions (1.5.10 or 1.6.11) and monitor for suspicious activity, while CERT Polska warns of potential attack chains combining this flaw with credential theft.

A newly discovered vulnerability in Roundcube webmail (CVE-2025-49113) has security experts warning of potential widespread attacks, with exploit code already circulating on underground forums. The flaw allows attackers to execute malicious code on vulnerable servers, putting thousands of organizations at risk if left unpatched.

Security researchers estimate approximately 84,000 internet-connected Roundcube installations remain exposed, primarily across Europe, Asia, and North America. Many belong to high-value targets, including government agencies, universities, and healthcare providers—making this vulnerability particularly attractive to cybercriminals and state-sponsored hacking groups.

READ ALSO  84,000+ Roundcube Servers at Risk from Active Exploit

Understanding the Threat

The vulnerability, CVE-2025-49113, stems from a PHP object deserialization flaw, enabling attackers to gain full control over affected servers. Exploitation requires only a basic user account, meaning even low-privileged credentials could serve as an entry point.

Patch Availability and Exploit Risks

Kirill Firsov, CEO of cybersecurity firm FearsOff, initially withheld technical details after privately reporting the issue. However, once threat actors reverse-engineered the patch, he released a proof-of-concept (PoC) exploit to help defenders detect and mitigate attacks.

Firsov emphasized Roundcube’s widespread adoption, noting that major hosting providers like GoDaddy, Hostinger, and OVH frequently include it in their offerings. This broad distribution increases the potential attack surface, especially since many users may not realize they’re running vulnerable instances.

Defensive Measures

In a related development, CERT Polska warned of a spear-phishing campaign exploiting CVE-2024-42009, an XSS flaw in Roundcube. Attackers have been harvesting credentials, exfiltrating email data, and spreading further phishing messages from compromised accounts.

Security teams should remain vigilant—combining credential theft with CVE-2025-49113 could create a devastating attack chain, allowing adversaries to escalate access and maintain persistence on vulnerable systems.

For real-time updates on emerging threats, subscribe to our breaking news alerts and stay ahead of critical vulnerabilities.

(Source: HELPNET Security)

Topics

roundcube vulnerability cve-2025-49113 95% active exploitation 90% unpatched installations 85% remote code execution 85% php object deserialization flaw 80% patch release poc exploit 75% defensive measures 75% high-value targets 70% spear-phishing campaign cve-2024-42009 70% cyber espionage 65%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.