Language:
https://security-tracker.debian.org/tracker/source-package/roundcube
Severity: High
ID: 237972
File Name: debian_DLA-4211.nasl
Version: 1.3
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 6/9/2025
Updated: 2/24/2026
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.2
Risk Factor: High
Base Score: 9
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2025-49113
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.2
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:roundcube-core, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:roundcube, p-cpe:/a:debian:debian_linux:roundcube-mysql, p-cpe:/a:debian:debian_linux:roundcube-plugins, p-cpe:/a:debian:debian_linux:roundcube-pgsql, p-cpe:/a:debian:debian_linux:roundcube-sqlite3
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/9/2025
Vulnerability Publication Date: 6/2/2025
CISA Known Exploited Vulnerability Due Dates: 3/13/2026
Core Impact
Metasploit (Roundcube Post-Auth RCE via PHP Object Deserialization)
CVE: CVE-2025-49113
IAVA: 2025-A-0392-S