Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-49113

Опубликовано: 02 июн. 2025
Источник: redhat
CVSS3: 9.9
EPSS Высокий

Описание

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

A flaw was found in Roundcube Webmail. This vulnerability allows remote code execution by authenticated users via PHP object deserialization through unvalidated _from parameter in upload.php.

Отчет

Red Hat has evaluated this vulnerability and its related components. No products are affected as Roundcube Webmail is not shipped in the Red Hat Product Portfolio.

Меры по смягчению последствий

To mitigate this vulnerability, update Roundcube Webmail to version 1.5.10 or 1.6.11, which addresses the issue by properly validating the _from parameter in upload.php.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2369696roundcubemail: Remote Code Execution in Roundcube via Unvalidated _from Parameter

EPSS

Процентиль: 99%
0.85599
Высокий

9.9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.9
ubuntu
3 месяца назад

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

CVSS3: 9.9
nvd
3 месяца назад

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

CVSS3: 9.9
debian
3 месяца назад

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote ...

CVSS3: 9.9
github
3 месяца назад

Roundcube Webmail Vulnerable to Authenticated RCE via PHP Object Deserialization

CVSS3: 9.9
fstec
3 месяца назад

Уязвимость почтового клиента RoundCube Webmail, связанная с недостатками механизма десериализации при обработке параметра _from, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.85599
Высокий

9.9 Critical

CVSS3