EPSS Alert: The probability of this vulnerability being exploited in the next 30 days is 90.0% (percentile: 100%).
Summary
| Parameter | Value |
|---|---|
| CVE ID | CVE-2025-49113 |
| Alert Source | CISA KEV - Active Exploitation |
| CVE Publication Year | 2025 |
| Date Published | 2026-02-20 |
| Vendor | Roundcube |
| Product | Webmail |
| CVSS Score | 9.9 (critical) |
| EPSS Score | 90.0% (percentile: 100%) |
| CISA KEV | Yes - confirmed active exploitation |
| Ransomware | Not confirmed |
| Remediation Deadline | 2026-03-13 |
Vulnerability Description
RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.
Required Actions
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
High Exploitation Risk
According to EPSS (Exploit Prediction Scoring System), the probability of this vulnerability being exploited within 30 days is very high (90.0%). We recommend prioritizing this update.
Who Is Affected?
This vulnerability affects Webmail by Roundcube. Check if your organization uses this software and requires updates.
Sources
Need help securing your systems? nFlo team offers vulnerability management and 24/7 SOC services. Contact us.
