CVE Vulnerabilities

CVE-2025-49113

Deserialization of Untrusted Data

Published: Jun 02, 2025 | Modified: Dec 22, 2025
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
9.9 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

Weakness

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

Affected Software

NameVendorStart VersionEnd Version
WebmailRoundcube*1.5.10 (excluding)
WebmailRoundcube1.6.0 (including)1.6.11 (excluding)
RoundcubeUbuntuesm-apps/bionic*
RoundcubeUbuntuesm-apps/focal*
RoundcubeUbuntuesm-apps/jammy*
RoundcubeUbuntuesm-apps/noble*
RoundcubeUbuntuesm-apps/xenial*
RoundcubeUbuntufocal*
RoundcubeUbuntujammy*
RoundcubeUbuntunoble*
RoundcubeUbuntuoracular*
RoundcubeUbuntuplucky*
RoundcubeUbuntuupstream*

Potential Mitigations

  • Make fields transient to protect them from deserialization.
  • An attempt to serialize and then deserialize a class containing transient fields will result in NULLs where the transient data should be. This is an excellent way to prevent time, environment-based, or sensitive variables from being carried over and used improperly.

References