theinfosecnews

CVE-2025-49113

CISA KEV

Published February 20, 2026 · Updated April 3, 2026

high

What This Means

# CVE-2025-49113: Roundcube Webmail Authenticated RCE **What it is:** Roundcube Webmail fails to validate the `_from` parameter in `program/actions/settings/upload.php`, allowing deserialization of untrusted data. An authenticated attacker can craft a malicious request to execute arbitrary code on the server. **Impact:** Any user with valid Roundcube credentials can achieve remote code execution with the privileges of the web server process, leading to full system compromise, data exfiltration, or lateral movement within your mail infrastructure. **Action required:** Update Roundcube to the patched version immediately. If patched versions are unavailable, implement WAF rules to block requests with suspicious `_from` parameter values in the upload.php endpoint, and audit access logs for exploitation attempts. Restrict Roundcube access to trusted networks pending remediation.

Official Description+

RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.

Affected Products

VendorProduct
RoundcubeWebmail

Patch Status

Patch by 2026-03-13

Recommended Actions

  1. Check if your systems use any of the affected products listed above.
  2. Apply vendor patches immediately if available.
  3. This vulnerability is in CISA's Known Exploited Vulnerabilities catalog — prioritize remediation.
  4. Monitor vendor advisories for updates and additional mitigations.
  5. Review logs for indicators of compromise related to CVE-2025-49113.