Description
Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
Product(s):
- Roundcube Webmail
Question to Ask Vendors:
- Can you confirm if you have updated all instances of Roundcube Webmail to versions 1.5.10 or 1.6.11 to mitigate the risk of CVE-2025-49113 and CVE-2024-42009?
- Have you implemented measures to monitor server logs for POST requests to program/actions/settings/upload.php that include unusually large or nonstandard serialized data, as recommended in the advisory?
- Have you reviewed and adjusted file permissions to ensure that the webserver user has only the minimum necessary filesystem permissions to limit post-exploitation damage?
- Have you audited all authenticated user accounts for suspicious configuration changes or unexpected mail forwarding rules as a part of your remediation process for CVE-2025-49113?
Recommended Actions:
- Audit User Accounts: Immediately review all authenticated user accounts for suspicious configuration changes or unexpected mail forwarding rules.
- Harden Web Access: Restrict access to Roundcube’s upload.php to authorized IP ranges and enforce multi-factor authentication for all mail users.
- Monitor for Exploit Indicators: Watch server logs for POST requests to program/actions/settings/upload.php that include unusually large or nonstandard serialized data.
- Review File Permissions: Ensure that the webserver user has only the minimum necessary filesystem permissions to limit post-exploitation damage.
- Upgrade Roundcube: 1.5 LTS installations: Update to 1.5.10 or later. 1.6.x installations: Update to 1.6.11 or later.