Roundcube Webmail has fixed a critical security flaw that could enable remote code execution after authentication. Disclosed by security researcher firs0v, the issue has been addressed in the latest updates for the 1.6 and 1.5 LTS versions.
The security update addresses a post-authentication RCE vulnerability caused by PHP object deserialization. This flaw allows an attacker with valid credentials or access to an authenticated session to execute arbitrary PHP code on the server, threatening data integrity and server control.
By infosecbulletin
/ Tuesday , June 3 2025
In March 2025, the Threatfabric mobile Threat Intelligence team identified Crocodilus, a new Android banking Trojan designed for device takeover....
Read More
By infosecbulletin
/ Tuesday , June 3 2025
Qualcomm has issued security patches for three zero-day vulnerabilities in the Adreno GPU driver, affecting many chipsets that are being...
Read More
By infosecbulletin
/ Monday , June 2 2025
Roundcube Webmail has fixed a critical security flaw that could enable remote code execution after authentication. Disclosed by security researcher...
Read More
By infosecbulletin
/ Sunday , June 1 2025
A hacker known as "303" claim to breach the company's systems and leaked sensitive internal data on a dark web...
Read More
By infosecbulletin
/ Sunday , June 1 2025
CISA and ACSC issued new guidance this week on how to procure, implement, and maintain SIEM and SOAR platforms. SIEM...
Read More
By infosecbulletin
/ Saturday , May 31 2025
The Qualys Threat Research Unit (TRU) found two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities....
Read More
By infosecbulletin
/ Saturday , May 31 2025
New ransomware payment reporting rules take effect in Australia yesterday (May 30) for all organisations with an annual turnover of...
Read More
By infosecbulletin
/ Saturday , May 31 2025
Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require...
Read More
By infosecbulletin
/ Thursday , May 29 2025
GreyNoise has discovered a campaign where attackers have gained unauthorized access to thousands of internet-exposed ASUS routers. This seems to...
Read More
By infosecbulletin
/ Wednesday , May 28 2025
The rise of online gambling in the country is leading to increased crime and societal issues. In response, the central...
Read More
“Fix Post-Auth RCE via PHP Object Deserialization reported by firs0v,” reads the changelog entry, marking the vulnerability as a high-priority issue in the latest releases.
Deserialization vulnerabilities happen when user input is processed by PHP’s unserialize() function without proper validation. This allows attackers to create payloads that cause harmful behavior.
Roundcube Webmail is widely used by individuals, hosting providers, and businesses. Its extensive use and interaction with email data mean that a server-side RCE vulnerability, even after authentication, could enable attackers to:
Deploy web shells
Access or alter emails and user data
Use compromised servers for further internal intrusion or spam campaigns
The vulnerability impacts both:
Roundcube 1.6.x
Roundcube 1.5.x (LTS)
Users are urged to upgrade to the latest versions:
1.6.11
1.5.10
These versions also include numerous bug fixes, including improvements to OAuth token refresh, HTML message previews, dark mode rendering, and support for ldapi:// URIs.
Hacker claim Leak of Deloitte Source Code & GitHub Credentials