Orchid Road, Lekki, Lagos.
CVE‑2025‑49113 is a post‑authentication remote‑code‑execution flaw that sat unnoticed in Roundcube’s code for ten years. A public proof‑of‑concept was released on 2 June 2025 and, within days, Shadowserver scans showed 84,000+ internet‑facing Roundcube servers still running vulnerable builds. Active exploitation has already been confirmed, prompting CISA to add the bug to its Known Exploited Vulnerabilities (KEV) catalogue on 10 June 2025.
What exactly happened?
Timeline | Key event |
---|
27 May 2025 | Researcher Kirill Firsov privately reports a “_from” parameter deserialisation flaw in actions/settings/upload.php . |
1 Jun 2025 | Roundcube releases 1.6.11 / 1.5.10, closing the hole. |
2 Jun 2025 | PoC code published; mass‑scanning begins. |
9 Jun 2025 | BleepingComputer reports 84 k exposed hosts. |
10 Jun 2025 | CISA adds CVE‑2025‑49113 to the KEV list. |
The bug is a classic PHP object‑deserialisation issue: an attacker who already has valid web‑mail credentials (easy to buy or phish) can send a crafted request that unserialises a malicious payload, leading to arbitrary code execution under the web‑server account. Because Roundcube ships embedded in cPanel, Plesk, DirectAdmin, ISPConfig and countless shared‑hosting images, the blast radius is huge.
Exploitation in the wild
Security‑weeklies and incident responders have already tied opportunistic smash‑and‑grab compromises to the PoC. In parallel, APT28 and other state‑linked actors—who historically weaponised Roundcube XSS bugs—have shifted to the new RCE for higher‑value espionage targets.
Shadowserver’s week‑long telemetry shows the vulnerable population falling only slowly from ~85 k to ~71 k hosts—a sign that many admins have not yet rolled out patches.
Zoom‑in: what does this mean for Nigeria?
Immediate actions for Nigerian hosts & admins
Audience | Action items (ranked) |
---|
Shared‑hosting resellers | 1. Force an immediate “upcp” or request your upstream provider to apply cPanel ≥ 118.0.46. 2. Verify /usr/local/cpanel/base/roundcube/ contains Roundcube 1.6.11; anything lower is unsafe.3. Enable two‑factor auth for cPanel & webmail to raise the bar on credential‑stuffing. |
On‑prem Roundcube operators | 1. Upgrade to 1.6.11 (or 1.5.10 LTS) from https://roundcube.net/download. 2. Regenerate your config ( composer install --no-dev --optimize-autoloader ).3. Review /var/log/roundcube/errors and web‑server logs for unusual POSTs to ?_task=settings&_action=upload . |
Enterprise SOC & MSPs | 1. Add CVE‑2025‑49113 IoCs to NIDS/WAF. 2. Hunt for suspicious PHP processes spawned by apache /www-data .3. Follow CISA KEV deadlines (federal agencies must remediate by 1 July 2025). |
End‑users | Until your provider confirms the patch, avoid opening web‑mail on untrusted networks; prefer IMAP/SMTP over TLS with a desktop client. |
SiteHUB’s own infrastructure was patched on 18th June 2025 and is running Roundcube 1.6.11, so customers with us are already protected.
Closing thoughts
CVE‑2025‑49113 is not “just another Roundcube XSS.” It is a full RCE lurking in millions of shared‑hosting email inboxes, weaponised within 48 hours of disclosure. Nigeria’s heavy dependence on foreign shared‑hosting makes the local ecosystem particularly slow to patch—yet the fix is literally a one‑line yum update
. If you manage any cPanel or self‑hosted Roundcube instance and haven’t rebooted it since 1 June 2025, treat it as compromised until proven otherwise.
Stay safe, patch early, patch often!
Leave A Comment