Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49113 PoC — Roundcube Webmail 安全漏洞

Source
Associated Vulnerability
Title:Roundcube Webmail 安全漏洞 (CVE-2025-49113)
Description:Roundcube Webmail是Roundcube开源的一款基于浏览器的开源IMAP客户端,它支持地址薄管理、信息搜索、拼写检查等。 Roundcube Webmail 1.5.10之前版本和 1.6.11之前版本存在安全漏洞,该漏洞源于未验证_from参数,可能导致PHP对象反序列化攻击。
Readme
## Install 
```
docker run --name ubuntu24 \
  -p 9876:80 \
  -v "$PWD/rc_install.sh":/root/rc_install.sh \
  -it ubuntu:24.04 \
  bash -c "chmod +x /root/rc_install.sh && /root/rc_install.sh && exec bash" 
```


## POC [Youtube](https://www.youtube.com/watch?v=3fxl7wCYsjU&feature=youtu.be)

### Follow me [@Linkdin](https://www.linkedin.com/in/punitdarji/)


Credit @ [fearsoff-org](https://github.com/fearsoff-org/CVE-2025-49113)
File Snapshot

[4.0K] /data/pocs/3feac5373fd412ad06ed9063807ecf1796ab0b37 ├── [ 11K] CVE-2025-49113.php ├── [4.8K] rc_install.sh └── [ 433] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.