Critical Roundcube Flaws Under Active Attack
The Cybersecurity and Infrastructure Security Agency (CISA) has added two Roundcube Webmail vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, citing confirmed active exploitation in the wild. The flaws — CVE-2025-49113 (CVSS 9.9) and CVE-2025-68461 (CVSS 7.2) — allow remote code execution and cross-site scripting respectively, and affect organizations worldwide that rely on Roundcube as their webmail solution.
Federal Civilian Executive Branch (FCEB) agencies are required to patch by March 13, 2026, per Binding Operational Directive (BOD) 22-01. However, CISA strongly urges all organizations using Roundcube to apply patches immediately given the confirmed exploitation activity.
Roundcube is one of the most widely deployed open-source webmail clients, used extensively by government agencies, universities, ISPs, and enterprises — making these vulnerabilities particularly high-impact.
Vulnerability Details
| Attribute | CVE-2025-49113 | CVE-2025-68461 |
|---|---|---|
| CVSS Score | 9.9 (Critical) | 7.2 (High) |
| Type | Deserialization of Untrusted Data | Cross-Site Scripting (XSS) |
| Component | program/actions/settings/upload.php | SVG animate tag handling |
| Attack Vector | Network (authenticated) | Network (email delivery) |
| User Interaction | None (post-authentication) | Required (open malicious email) |
| Impact | Remote Code Execution (RCE) | Session hijacking, mail exfiltration |
| Exploitation | Active — weaponized within 48 hours of disclosure | Active — confirmed in the wild |
| Hidden Duration | 10+ years in the codebase | N/A |
| Patched Versions | 1.5.10 / 1.6.11 (and backports) | 1.5.12 / 1.6.12 |
| FCEB Patch Deadline | March 13, 2026 | March 13, 2026 |
How the Vulnerabilities Work
CVE-2025-49113: Deserialization RCE (CVSS 9.9)
This critical vulnerability exists in Roundcube's file upload handler at program/actions/settings/upload.php. The flaw stems from a failure to validate the _from parameter in the URL:
- An authenticated user submits a crafted request to the upload endpoint
- The
_fromparameter is passed directly to a deserialization function without validation - The attacker provides a serialized PHP object containing malicious payloads
- The server deserializes the untrusted data, executing arbitrary code with web server privileges
- The attacker achieves full remote code execution on the Roundcube server
This vulnerability is particularly dangerous because:
- It has been hidden in the codebase for over 10 years
- It triggers reliably on default installations without additional configuration
- It requires only authenticated user access (any valid webmail account)
- Attackers weaponized it within 48 hours of public disclosure
- An exploit was offered for sale as early as June 4, 2025
CVE-2025-68461: SVG-Based XSS (CVSS 7.2)
This cross-site scripting vulnerability exploits Roundcube's handling of SVG images embedded in emails:
- An attacker crafts a malicious email containing an SVG image
- The SVG contains a
<animate>tag with embedded JavaScript - When the victim opens the email in Roundcube's web interface, the SVG renders
- The JavaScript executes in the context of the victim's Roundcube session
- The attacker can then:
- Read all emails in the victim's mailbox
- Exfiltrate session tokens and authentication cookies
- Send emails silently from the victim's account
- Modify mail filters to redirect future correspondence
Historical Context: Roundcube as an APT Target
Roundcube vulnerabilities have a well-documented history of exploitation by state-sponsored threat actors:
| Group | Campaign | Year | Target |
|---|---|---|---|
| APT28 (Fancy Bear) | Government webmail exploitation | 2023–2024 | European government agencies |
| Winter Vivern | CVE-2023-5631 XSS campaign | 2023 | European governments and think tanks |
| TAG-70 | Roundcube XSS exploitation | 2024 | Government and military organizations |
| Unknown | CVE-2025-49113 exploitation | 2025–2026 | Organizations running default Roundcube |
The pattern is clear: Roundcube's widespread deployment in government and institutional environments makes it a persistent target for both espionage and cybercrime operations.
Impact Assessment
| Impact Area | Description |
|---|---|
| Government agencies | FCEB agencies running Roundcube are immediate targets — 3-week patch deadline |
| Universities and ISPs | Widely deployed in education and ISP environments with large user bases |
| Email confidentiality | XSS vulnerability enables silent email surveillance and exfiltration |
| Server compromise | RCE vulnerability provides full server access for data theft or lateral movement |
| Supply chain risk | Compromised mail servers can be used to send convincing phishing from legitimate accounts |
| Espionage operations | State-sponsored groups have historically targeted Roundcube for intelligence collection |
Patching Guide
Affected Versions and Fixes
| Branch | Fix for CVE-2025-49113 | Fix for CVE-2025-68461 | Recommended Version |
|---|---|---|---|
| 1.5.x | 1.5.10+ | 1.5.12+ | 1.5.12 or later |
| 1.6.x | 1.6.11+ | 1.6.12+ | 1.6.12 or later |
How to Update
- Backup your Roundcube installation and database
- Download the latest release from the Roundcube releases page
- Follow the upgrade guide for your deployment method
- Verify the version number in
Settings > Aboutafter upgrade - Test email functionality to ensure no regressions
Recommendations
For IT Administrators
- Patch Roundcube immediately — Update to 1.5.12 or 1.6.12 (or later)
- Restrict upload.php access if patching is delayed — Apply WAF rules to block crafted
_fromparameters - Disable SVG rendering in Roundcube configuration as a temporary mitigation for CVE-2025-68461
- Audit user accounts for signs of compromise — Check for unauthorized mail filter changes or forwarding rules
- Enable CSP headers to reduce XSS impact if not already configured
For Security Teams
- Hunt for exploitation indicators — Review web server logs for unusual requests to
upload.phpwith serialized data - Monitor for email exfiltration — Look for bulk email access patterns or unusual IMAP/POP connections
- Check for unauthorized mail rules — Compromised accounts may have attacker-created forwarding or filter rules
- Correlate with threat intelligence — APT28 and Winter Vivern have historically exploited Roundcube
- Assess exposure — Identify all Roundcube instances in your environment and prioritize patching by exposure level
Key Takeaways
- Two Roundcube vulnerabilities added to CISA KEV — CVE-2025-49113 (CVSS 9.9, RCE) and CVE-2025-68461 (CVSS 7.2, XSS)
- Active exploitation confirmed — Attackers weaponized CVE-2025-49113 within 48 hours of disclosure
- Federal agencies must patch by March 13, 2026 — All organizations should patch immediately
- CVE-2025-49113 was hidden for 10+ years in the Roundcube codebase and triggers on default installations
- Roundcube remains a persistent APT target — State-sponsored groups including APT28 and Winter Vivern have a documented history of targeting this platform
- Update to Roundcube 1.5.12 or 1.6.12 to address both vulnerabilities
Sources
- The Hacker News — CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
- BleepingComputer — CISA: Recently Patched Roundcube Flaws Now Exploited in Attacks
- SecurityAffairs — U.S. CISA Adds Roundcube Webmail Flaws to KEV Catalog
- GBHackers — CISA Warns of Actively Exploited Roundcube Vulnerabilities