DEBIAN-CVE-2025-49113

Advisory lineage Upstream: 1 Downstream: 2
Published: 02 Jun 2025, 05:15
Last modified:23 Dec 2025, 11:17

Vulnerability Summary

Overall Risk (default)
medium
35/100
CVSS Score
8.8 HIGH
3.1 (osv_debian)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

02 Jun 2025, 05:15
Published
Vulnerability first disclosed
23 Dec 2025, 11:17
Last Modified
Vulnerability information updated

Description

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

CVSS Metrics

  • v3.1HIGHScore: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Systems

  • debianroundcube

    < 1.4.15+dfsg.1-1+deb11u5 | < 1.6.5+dfsg-1+deb12u5 | < 1.6.11+dfsg-1 | < 1.6.11+dfsg-1

References (1)