DEBIAN-CVE-2025-49113
Advisory lineage Upstream: 1 Downstream: 2
Upstream
Downstream
Published: 02 Jun 2025, 05:15
Last modified:23 Dec 2025, 11:17
Vulnerability Summary
Overall Risk (default)
medium
35/100 CVSS Score
8.8 HIGH
3.1 (osv_debian)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
02 Jun 2025, 05:15
Published
Vulnerability first disclosed
23 Dec 2025, 11:17
Last Modified
Vulnerability information updated
Description
Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
CVSS Metrics
- v3.1•HIGH•Score: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Systems
- debian•roundcube
< 1.4.15+dfsg.1-1+deb11u5 | < 1.6.5+dfsg-1+deb12u5 | < 1.6.11+dfsg-1 | < 1.6.11+dfsg-1