Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-49113.yaml | POC Details |
| 2 | Detection for CVE-2025-49113 | https://github.com/rxerium/CVE-2025-49113 | POC Details |
| 3 | CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Object Deserialization | https://github.com/Ademking/CVE-2025-49113-nuclei-template | POC Details |
| 4 | None | https://github.com/fearsoff-org/CVE-2025-49113 | POC Details |
| 5 | None | https://github.com/rasool13x/exploit-CVE-2025-49113 | POC Details |
| 6 | CVE-2025-49113 exploit | https://github.com/SyFi/CVE-2025-49113 | POC Details |
| 7 | Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113). | https://github.com/hakaioffsec/CVE-2025-49113-exploit | POC Details |
| 8 | Proof-of-concept to CVE-2025-49113 | https://github.com/BiiTts/Roundcube-CVE-2025-49113 | POC Details |
| 9 | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | https://github.com/Yuri08loveElaina/CVE-2025-49113 | POC Details |
| 10 | CVE-2025-49113 | https://github.com/B1ack4sh/Blackash-CVE-2025-49113 | POC Details |
| 11 | Explicação + Lab no THM | https://github.com/5kr1pt/Roundcube_CVE-2025-49113 | POC Details |
| 12 | None | https://github.com/punitdarji/roundcube-cve-2025-49113 | POC Details |
| 13 | A powerful Python scanner to detect CVE-2025-49113 vulnerability in Roundcube Webmail. Developed by Issam Junior (@issamiso). | https://github.com/issamjr/CVE-2025-49113-Scanner | POC Details |
| 14 | None | https://github.com/hackmelocal/HML-CVE-2025-49113-Round-Cube | POC Details |
| 15 | None | https://github.com/Joelp03/CVE-2025-49113 | POC Details |
| 16 | None | https://github.com/hackmelocal/CVE-2025-49113-Simulation | POC Details |
| 17 | 💥 Python Exploit for CVE-2025-49113 | Roundcube Webmail RCE via PHP Object Injection | https://github.com/00xCanelo/CVE-2025-49113 | POC Details |
| 18 | None | https://github.com/CyberQuestor-infosec/CVE-2025-49113-Roundcube_1.6.10 | POC Details |
| 19 | This is a rewritten exploit to work with php | https://github.com/SteamPunk424/CVE-2025-49113-Roundcube-RCE-PHP | POC Details |
| 20 | POC of CVE-2025-49113 | https://github.com/Zwique/CVE-2025-49113 | POC Details |
| 21 | Python Script for CVE-2025-49113. Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | https://github.com/AC8999/CVE-2025-49113 | POC Details |
| 22 | Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization | https://github.com/LeakForge/CVE-2025-49113 | POC Details |
| 23 | None | https://github.com/Zuack55/Roundcube-1.6.10-Post-Auth-RCE-CVE-2025-49113- | POC Details |
| 24 | CVE-2025-49113 - Roundcube Remote Code Execution | https://github.com/l4f2s4/CVE-2025-49113_exploit_cookies | POC Details |
| 25 | Hands-on exploitation lab for Roundcube Webmail CVE-2025-49113 (authenticated PHP object deserialization → RCE) to read /secret.txt. | https://github.com/ankitpandey383/roundcube-cve-2025-49113-lab | POC Details |
| 26 | CVE-2025-49113 | https://github.com/Ashwesker/Blackash-CVE-2025-49113 | POC Details |
| 27 | CVE-2025-49113 | https://github.com/Ashwesker/Ashwesker-CVE-2025-49113 | POC Details |
| 28 | None | https://github.com/Evillm/CVE-2025-49113-PoC | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.