Article Details
Scrape Timestamp (UTC): 2025-06-05 16:58:08.173
Original Article Text
Click to Toggle View
Hacker selling critical Roundcube webmail exploit as tech info disclosed. Hackers are likely starting to exploit CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows remote execution. The security issue has been present in Roundcube for over a decade and impacts versions of Roundcube webmail 1.1.0 through 1.6.10. It received a patch on June 1st. It took attackers just a couple of days to reverse engineer the fix, weaponize the vulnerability, and start selling a working exploit on at least one hacker forum. Roundcube is one of the most popular webmail solutions as the product is included in offers from well-known hosting providers such as GoDaddy, Hostinger, Dreamhost, or OVH. "Email armageddon" CVE-2025-49113 is a post-authentication remote code execution (RCE) vulnerability that received a critical severity score of 9.9 out of 10 and is described as “email armageddon.” It was discovered and reported by Kirill Firsov, the CEO of the cybersecurity company FearsOff, who decided to publish the technical details before the end of the responsible disclosure period because an exploit had become available. “Given the active exploitation and evidence of the exploit being sold in underground forums, I believe it is in the best interest of defenders, blue teams, and the broader security community to publish a full technical breakdown but without complete PoC for now” - Kirill Firsov At the root of the security problem is the lack of sanitization of the $_GET['_from'] parameter, which leads to PHP Object deserialization. In the technical report, Firsov explains that when an exclamation mark initiates a session variable name, the session becomes corrupted and object injection becomes possible. After Roundcube received a patch, attackers analyzed the modifications it introduced, developed an exploit, and advertised it on a hacker forum, noting that a working login is required. However, the need for login credentials does not seem like a deterrent, since the threat actor offering the exploit says that they can extract it from the logs, or it can be brute forced. Firsov says that the credential combination could also be obtained through cross-site request forgery (CSRF). According to Firsov, at least one vulnerability broker pays up to $50,000 for an RCE exploit in Roundcube. The researcher published a video to demonstrate how the vulnerability can be exploited. It should be noted that the researcher uses the vulnerability identifier CVE-2025-48745 in the demonstration, which is currently rejected as a duplicate candidate for CVE-2025-49113. Despite being a less-known application among consumers, Roundcube is very popular, mostly because it is highly customizable with more than 200 options, and it is freely available. Apart from being offered by hosting providers and bundled in web hosting control panels (cPanel, Plesk), numerous organizations in the government, academic, and tech sectors use Roundcube. Firsov also says that this webmail app has such a wide presence that a pentester is more likely to find a Roundcube instance than an SSL misconfiguration. Considering the ubiquity of the application, the researcher says that “the attack surface isn’t big - it’s industrial.” Indeed, a quick look on search engines for discovering internet-connected devices and services shows at least 1.2 million Roundcube hosts. Why IT teams are ditching manual patch management Manual patching is outdated. It's slow, error-prone, and tough to scale. Join Kandji + Tines on June 4 to see why old methods fall short. See real-world examples of how modern teams use automation to patch faster, cut risk, stay compliant, and skip the complex scripts.
Daily Brief Summary
A critical vulnerability in Roundcube webmail, identified as CVE-2025-49113, allows for remote code execution and has been present for over a decade.
This flaw impacts versions from 1.1.0 to 1.6.10, with a patch released on June 1st; however, attackers quickly reversed engineered this patch to create an exploitable weapon.
The exploit, demanding authenticated access, was advertised for sale on hacker forums, showing that the requirement for login credentials does not notably hinder malicious activity.
The vulnerability exploits lack of sanitization in the $_GET['_from'] parameter, which can lead to object injection by corrupting session variables.
Kirill Firsov, CEO of cybersecurity firm FearsOff, published technical details and a demonstration video of the exploit to aid in defense efforts, even as underground markets offered up to $50,000 for such exploits.
Roundcube's popularity among hosting providers and its inclusion in web hosting control panels make it a significant target, with over 1.2 million hosts detected online.
This widespread use in various sectors underscores the high risk and broad potential impact of the exploit termed "email armageddon" by researchers.