Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4211-1 | roundcube security update |
Debian DSA |
DSA-5934-1 | roundcube security update |
Github GHSA |
GHSA-8j8w-wwqc-x596 | Roundcube Webmail Vulnerable to Authenticated RCE via PHP Object Deserialization |
Ubuntu USN |
USN-7584-1 | Roundcube vulnerability |
Fri, 20 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Fri, 20 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Mon, 22 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| CPEs | cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux |
Thu, 12 Jun 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 09 Jun 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 06 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | roundcubemail: Remote Code Execution in Roundcube via Unvalidated _from Parameter | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 02 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Jun 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 02 Jun 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 02 Jun 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-21T04:56:23.141Z
Reserved: 2025-06-02T00:00:00.000Z
Link: CVE-2025-49113
Updated: 2025-06-09T03:27:58.478Z
Status : Analyzed
Published: 2025-06-02T05:15:53.420
Modified: 2026-02-23T13:24:21.387
Link: CVE-2025-49113
OpenCVE Enrichment
Updated: 2025-06-20T15:42:51Z
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN