Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49113 PoC — Roundcube Webmail 安全漏洞

Source
Associated Vulnerability
Title:Roundcube Webmail 安全漏洞 (CVE-2025-49113)
Description:Roundcube Webmail是Roundcube开源的一款基于浏览器的开源IMAP客户端,它支持地址薄管理、信息搜索、拼写检查等。 Roundcube Webmail 1.5.10之前版本和 1.6.11之前版本存在安全漏洞,该漏洞源于未验证_from参数,可能导致PHP对象反序列化攻击。
Description
This is a rewritten exploit to work with php
Readme
# CVE-2025-49113-Roundcube-RCE-PHP

Roundcube Webmail versions 1.5.0 through 1.6.10  
This is a rewritten exploit to work with PHP.

## Usage

```bash
php CVE-2025-49113.php <url> <username> <password>
File Snapshot

[4.0K] /data/pocs/84908f41c00cf8e11fa0c8cef3d2806ee41e1edf ├── [6.7K] exploit.php └── [ 202] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.