Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49113 PoC — Roundcube Webmail 安全漏洞

Source
Associated Vulnerability
Title:Roundcube Webmail 安全漏洞 (CVE-2025-49113)
Description:Roundcube Webmail是Roundcube开源的一款基于浏览器的开源IMAP客户端,它支持地址薄管理、信息搜索、拼写检查等。 Roundcube Webmail 1.5.10之前版本和 1.6.11之前版本存在安全漏洞,该漏洞源于未验证_from参数,可能导致PHP对象反序列化攻击。
Description
CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Object Deserialization
Readme
# Nuclei vulnerability detection template - CVE-2025-49113 - Roundcube ≤ 1.6.10 Post-Authentication Remote Code Execution

![](https://i.imgur.com/ejVwHRD.png)

**CVE ID:** CVE-2025-49113  
**Severity:** Critical (CVSS 10.0)  
**Discovered by:** Kirill Firsov (FearsOff)  
**Date Disclosed:** June 1, 2025  
**Fixed in:** Roundcube 1.6.11 / 1.5.10 LTS

    - https://nvd.nist.gov/vuln/detail/CVE-2025-49113
    - https://github.com/advisories/GHSA-8j8w-wwqc-x596
    - https://fearsoff.org/research/roundcube
    - http://www.openwall.com/lists/oss-security/2025/06/02/3
    - https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10

File Snapshot

[4.0K] /data/pocs/c20305bd01a01eb183c82b7b3cc77a46d3349848 ├── [2.1K] CVE-2025-49113.yaml └── [ 653] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.