Roundcube Webmail 1.6.x < 1.6.11 Remote Code Execution

high Web App Scanning Plugin ID 115139

Synopsis

Roundcube Webmail 1.6.x < 1.6.11 Remote Code Execution

Description

According to its self-reported version number, Roundcube Webmail is prior to 1.5.10 or 1.6.x prior to 1.6.11. Therefore, it may be affected by a Remote code execution vulnerability by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization (CVE-2025-49113).

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Roundcube Webmail version 1.6.11 or later.

See Also

https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10

Plugin Details

Severity: High

ID: 115139

Type: remote

Published: 2/11/2026

Updated: 2/11/2026

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-49113

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2025-49113

Vulnerability Information

CPE: cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/1/2025

Reference Information

CVE: CVE-2025-49113