Netcrook Logo
👤 SECPULSE
🗓️ 21 Feb 2026   🌍 North America

Silent Infiltration: Roundcube’s Decade-Old Flaws Spark Urgent Government Scramble

Subtitle: Two critical vulnerabilities in Roundcube webmail, actively exploited and hidden for years, force agencies into rapid response mode.

In the shadowy corners of cyberspace, time can be a hacker’s best friend. For over a decade, a critical flaw lurked unnoticed within the code of Roundcube, one of the world’s most popular open-source webmail solutions. Now, with exploit code circulating just days after public disclosure, federal agencies are racing against the clock to patch vulnerabilities that have already been weaponized by unknown actors.

Fast Facts

  • Two major Roundcube vulnerabilities - CVE-2025-49113 and CVE-2025-68461 - have been added to CISA’s Known Exploited Vulnerabilities catalog.
  • CVE-2025-49113 allows remote code execution via a deserialization flaw and affects default installations.
  • Dubai-based FearsOff discovered the flaw, which was weaponized within 48 hours of disclosure; exploit code is already for sale.
  • The vulnerabilities have reportedly existed in the codebase for over 10 years.
  • U.S. federal agencies must remediate the flaws by March 13, 2026, to prevent compromise.

Inside the Vulnerability: How a Decade-Old Bug Became an Immediate Threat

When the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Roundcube flaws to its Known Exploited Vulnerabilities (KEV) catalog, it was more than a routine update - it was a warning flare. The most critical of the pair, CVE-2025-49113, scores a near-maximum 9.9 on the CVSS danger scale. This deserialization vulnerability allows attackers with authenticated access to execute arbitrary code on a server, thanks to inadequate validation of the _from parameter in a core upload function. In practical terms, it means cybercriminals can hijack servers, steal data, or use compromised systems as springboards for further attacks.

Discovered by Kirill Firsov of FearsOff, the flaw’s stealth is as alarming as its impact. “Attackers have already diffed and weaponized the vulnerability within 48 hours of public disclosure,” Firsov reported. The exploit is now available on underground markets, raising the stakes for organizations slow to patch. Even more chilling: the vulnerable code survived undetected for over a decade, quietly waiting for the right eyes to find it.

The second vulnerability, CVE-2025-68461, though less severe (CVSS 7.2), enables cross-site scripting (XSS) via SVG files, potentially allowing attackers to inject malicious code into users’ browsers. Both flaws have previously been leveraged by sophisticated nation-state actors, including APT28 and Winter Vivern, underscoring Roundcube’s appeal as a target for espionage and cyberwarfare.

With exploit code in the wild and weaponization confirmed, CISA has set a firm deadline: U.S. federal agencies must patch these flaws by March 13, 2026. For organizations worldwide, the message is clear - Roundcube servers left unpatched are already in the crosshairs.

Conclusion: The Cost of Complacency

This episode serves as a stark reminder: even trusted, widely used software can harbor dangerous secrets for years. As cybercriminals grow ever more agile, the margin for error shrinks. For defenders, vigilance and swift patching are no longer optional - they’re survival tactics in a threat landscape where yesterday’s oversight can become tomorrow’s breach.

WIKICROOK

  • CVE: CVE, or Common Vulnerabilities and Exposures, is a system for uniquely identifying and tracking publicly known cybersecurity flaws in software and hardware.
  • Deserialization: Deserialization converts data into usable program objects. If not done securely, it can let attackers inject harmful instructions into applications.
  • Remote Code Execution: Remote code execution lets attackers run commands on your computer from a distance, often leading to full system compromise and data theft.
  • Cross: Cross-Site Scripting (XSS) is a cyberattack where hackers inject malicious code into websites to steal user data or hijack sessions.
  • CVSS: CVSS (Common Vulnerability Scoring System) is a standard method for rating the severity of security flaws, with scores from 0.0 to 10.0.
Roundcube vulnerabilities Cybersecurity Remote code execution

SECPULSE SECPULSE
SOC Detection Lead
← Back to news