exploitdb
WORKING POC
by Maksim Rogov · webappsmultiple
https://www.exploit-db.com/exploits/52324
This Metasploit module exploits a PHP object deserialization vulnerability in Roundcube Webmail (CVE-2025-49113) to achieve remote code execution. It authenticates as a user, uploads a malicious payload via a crafted `_from` parameter, and executes arbitrary commands as the web server.
Classification
Working Poc 95%
Target:
Roundcube Webmail ≤ 1.6.10
Auth required
Prerequisites:
Valid Roundcube credentials · Access to the Roundcube login page
nomisec
WORKING POC
96 stars
by fearsoff-org · poc
https://github.com/fearsoff-org/CVE-2025-49113
This repository contains a functional PHP exploit for CVE-2025-49113, targeting Roundcube ≤ 1.6.10 via post-authentication PHP object deserialization to achieve remote code execution. The PoC includes authentication, CSRF token handling, payload injection, and execution steps.
Classification
Working Poc 95%
Target:
Roundcube ≤ 1.6.10
Auth required
Prerequisites:
Valid Roundcube credentials · Network access to the target Roundcube instance
nomisec
WORKING POC
90 stars
by hakaioffsec · remote-auth
https://github.com/hakaioffsec/CVE-2025-49113-exploit
This repository contains a functional exploit for CVE-2025-49113, targeting Roundcube Webmail. The exploit leverages a deserialization vulnerability in the Crypt_GPG_Engine class to achieve remote code execution (RCE) by uploading a malicious serialized payload.
Classification
Working Poc 95%
Target:
Roundcube Webmail (versions 1.5.0-1.5.9, 1.6.0-1.6.10)
Auth required
Prerequisites:
Valid Roundcube credentials · Access to the target Roundcube instance
github
WRITEUP
7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2025/CVE-2025-49113.md
The repository contains detailed technical writeups for multiple CVEs, including CVE-2025-49113, with root cause analysis, exploit details, and mitigation recommendations. It does not include functional exploit code but provides in-depth vulnerability research.
Classification
Writeup 95%
Target:
Various (e.g., Ivanti Connect Secure, Zabbix, Check Point VPN, Bricks Builder)
No auth needed
Prerequisites:
Access to vulnerable endpoints · Basic understanding of vulnerability exploitation
nomisec
WORKING POC
7 stars
by 00xCanelo · remote-auth
https://github.com/00xCanelo/CVE-2025-49113
This repository contains a functional Python exploit for CVE-2025-49113, targeting Roundcube Webmail versions ≤1.5.9 and ≤1.6.10. The exploit leverages PHP object injection via a malicious serialized payload in the `Crypt_GPG_Engine` class to achieve remote code execution post-authentication.
Classification
Working Poc 95%
Target:
Roundcube Webmail ≤1.5.9 and ≤1.6.10
Auth required
Prerequisites:
Vulnerable Roundcube version · Valid user credentials · Python 3.x environment
nomisec
WORKING POC
6 stars
by BiiTts · remote-auth
https://github.com/BiiTts/Roundcube-CVE-2025-49113
This repository contains a functional exploit for CVE-2025-49113, leveraging insecure deserialization in Roundcube's session parser to achieve remote code execution. The exploit includes a PHP gadget generator and a Python script to authenticate, check version vulnerability, and execute arbitrary commands.
Classification
Working Poc 95%
Target:
Roundcube 1.5.0-1.5.9, 1.6.0-1.6.10
Auth required
Prerequisites:
Valid Roundcube credentials · PHP 7.4+ for gadget generation · Python 3.7+ for exploit execution
nomisec
SCANNER
5 stars
by rxerium · poc
https://github.com/rxerium/CVE-2025-49113
This repository contains a Nuclei template for detecting vulnerable Roundcube instances by checking the version number in the HTML response. It does not exploit the vulnerability but scans for affected versions.
Classification
Scanner 100%
Target:
Roundcube Webmail < 1.5.10 and 1.6.0 - 1.6.10
No auth needed
Prerequisites:
Access to the target Roundcube instance
nomisec
WORKING POC
3 stars
by Zwique · remote-auth
https://github.com/Zwique/CVE-2025-49113
This repository contains a functional Python exploit for CVE-2025-49113, a critical RCE vulnerability in Roundcube Webmail due to insecure PHP object deserialization in the `upload.php` script. The exploit authenticates, crafts a malicious serialized payload, and delivers it via a multipart form upload to achieve remote code execution.
Classification
Working Poc 95%
Target:
Roundcube Webmail < 1.5.10, < 1.6.11
Auth required
Prerequisites:
Valid Roundcube credentials · Network access to the target · Vulnerable Roundcube version
nomisec
WORKING POC
3 stars
by rasool13x · remote-auth
https://github.com/rasool13x/exploit-CVE-2025-49113
This repository contains a functional PHP exploit for CVE-2025-49113, a PHP Object Deserialization vulnerability in Roundcube Webmail. The exploit leverages a crafted serialized object to write arbitrary files on the target server via the /settings/upload.php endpoint.
Classification
Working Poc 95%
Target:
Roundcube Webmail < 1.5.10 and < 1.6.11
Auth required
Prerequisites:
Valid Roundcube session cookie · Writable target path on the server
nomisec
SCANNER
3 stars
by Ademking · poc
https://github.com/Ademking/CVE-2025-49113-nuclei-template
This repository contains a Nuclei template for detecting CVE-2025-49113, a PHP object deserialization vulnerability in Roundcube Webmail. The template checks for vulnerable versions and confirms the presence of Roundcube but does not include exploit code.
Classification
Scanner 100%
Attack Type
Deserialization
Target:
Roundcube Webmail < 1.5.10, 1.6.x < 1.6.11
Auth required
Prerequisites:
Authenticated access to Roundcube Webmail
github
SCANNER
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-49113
The repository contains a scanner for CVE-2024-21762, a Fortinet SSL VPN vulnerability, which checks if a target is vulnerable by sending crafted HTTP requests. It also includes documentation for other CVEs like CVE-2024-10654 (TOTOLINK authentication bypass).
Classification
Scanner 90%
Target:
Fortinet SSL VPN, TOTOLINK LR350, TOTOLINK T6
No auth needed
Prerequisites:
network access to target · Python environment
nomisec
WORKING POC
2 stars
by SyFi · remote-auth
https://github.com/SyFi/CVE-2025-49113
This repository contains a functional exploit for CVE-2025-49113, targeting Roundcube Webmail via PHP object deserialization to achieve remote code execution (RCE). The exploit follows a multi-step process including CSRF token retrieval, authentication, and payload delivery to write a webshell.
Classification
Working Poc 95%
Target:
Roundcube Webmail
Auth required
Prerequisites:
Valid Roundcube Webmail credentials · Network access to the target · Write permissions in the target directory
nomisec
WORKING POC
1 stars
by l4f2s4 · remote-auth
https://github.com/l4f2s4/CVE-2025-49113_exploit_cookies
This repository contains a functional exploit for CVE-2025-49113, targeting an insecure deserialization vulnerability in Roundcube Webmail. The exploit leverages a crafted file upload with a malicious serialized PHP object to achieve remote code execution.
Classification
Working Poc 95%
Target:
Roundcube Webmail 1.5.0-1.5.9, 1.6.0-1.6.10
Auth required
Prerequisites:
Valid authenticated session · File upload functionality access · PHP 7.0 or higher
nomisec
WORKING POC
1 stars
by Joelp03 · remote-auth
https://github.com/Joelp03/CVE-2025-49113
This repository contains a functional Python exploit for CVE-2025-49113, targeting a PHP object deserialization vulnerability in Roundcube Webmail. The exploit automates authentication, session management, and payload delivery to achieve remote code execution via GPG configuration injection.
Classification
Working Poc 95%
Target:
Roundcube Webmail
Auth required
Prerequisites:
Valid Roundcube credentials · Network access to the target Roundcube instance
nomisec
WORKING POC
1 stars
by Yuri08loveElaina · remote-auth
https://github.com/Yuri08loveElaina/CVE-2025-49113
This repository contains a functional exploit for CVE-2025-49113, targeting Roundcube Webmail's deserialization vulnerability via the `_from` parameter. The exploit supports uploading a malicious PHAR payload and triggering its execution through a crafted request.
Classification
Working Poc 95%
Target:
Roundcube Webmail <=1.5.9, 1.6.0–1.6.10
Auth required
Prerequisites:
Valid Roundcube session cookie · Access to upload functionality · PHAR payload generated via phpggc
nomisec
WORKING POC
by rippsec · remote
https://github.com/rippsec/CVE-2025-49113-Roundcube-RCE
This repository contains a functional exploit for CVE-2025-49113, a PHP object deserialization vulnerability in Roundcube Webmail ≤ 1.6.10. The exploit authenticates to Roundcube, crafts a malicious serialized payload in the filename of an uploaded attachment, and achieves remote code execution via the `Crypt_GPG_Engine` gadget chain.
Classification
Working Poc 95%
Target:
Roundcube Webmail ≤ 1.6.10
Auth required
Prerequisites:
valid Roundcube credentials · access to the Roundcube web interface
nomisec
WORKING POC
by mooder1 · poc
https://github.com/mooder1/CVE-2025-49113
This repository contains a functional Python exploit for CVE-2025-49113, a post-authentication RCE vulnerability in Roundcube Webmail. The exploit leverages PHP object deserialization via crafted session variables injected through the settings upload endpoint, triggering command execution during session cleanup on logout.
Classification
Working Poc 95%
Target:
Roundcube Webmail 1.5.0-1.5.9 and 1.6.0-1.6.10
Auth required
Prerequisites:
valid Roundcube credentials · access to the settings upload endpoint
nomisec
WORKING POC
by Evillm · remote-auth
https://github.com/Evillm/CVE-2025-49113-PoC
This repository contains a functional exploit for CVE-2025-49113, targeting a post-authentication RCE vulnerability in Roundcube. The exploit chain involves CSRF token retrieval, authentication, payload construction via serialized object injection, file upload, and trigger execution via logout.
Classification
Working Poc 95%
Target:
Roundcube (version not explicitly specified)
Auth required
Prerequisites:
Valid Roundcube credentials · Network access to the target Roundcube instance
nomisec
WRITEUP
by ankitpandey383 · poc
https://github.com/ankitpandey383/roundcube-cve-2025-49113-lab
This repository provides a detailed walkthrough of exploiting CVE-2025-49113, a PHP object deserialization vulnerability in Roundcube Webmail, leading to remote code execution. It includes step-by-step instructions using Metasploit and Nmap for service discovery.
Classification
Writeup 90%
Target:
Roundcube Webmail up to 1.6.10
Auth required
Prerequisites:
Authenticated access to Roundcube Webmail · Metasploit framework · Nmap for service discovery
nomisec
SUSPICIOUS
by Zuack55 · poc
https://github.com/Zuack55/Roundcube-1.6.10-Post-Auth-RCE-CVE-2025-49113-
The repository claims to document a critical RCE vulnerability in Roundcube Webmail but provides no technical details or exploit code, instead directing users to an external PDF. This is a common tactic for luring researchers into downloading potentially malicious content.
Classification
Suspicious 90%
Attack Type
Deserialization
Target:
Roundcube Webmail <= 1.6.10
Auth required
Prerequisites:
Access to external PDF document
nomisec
STUB
by LeakForge · poc
https://github.com/LeakForge/CVE-2025-49113
The repository contains only a minimal README with a CVE title and brief description, lacking any exploit code, technical details, or proof-of-concept implementation. It appears to be a placeholder without substantive content.
Attack Type
Deserialization
Target:
Roundcube ≤ 1.6.10
Auth required
Prerequisites:
Valid authentication credentials for Roundcube
nomisec
WORKING POC
by AC8999 · remote-auth
https://github.com/AC8999/CVE-2025-49113
This repository contains a functional Python exploit for CVE-2025-49113, targeting Roundcube Webmail versions before 1.5.10 and 1.6.x before 1.6.11. The exploit leverages PHP object deserialization via the `_from` parameter in `upload.php` to achieve remote code execution (RCE) by authenticated users.
Classification
Working Poc 95%
Target:
Roundcube Webmail < 1.5.10, 1.6.x < 1.6.11
Auth required
Prerequisites:
Valid Roundcube credentials · Access to the target Roundcube instance
nomisec
WORKING POC
by SteamPunk424 · remote-auth
https://github.com/SteamPunk424/CVE-2025-49113-Roundcube-RCE-PHP
This repository contains a functional PHP exploit for CVE-2025-49113, targeting Roundcube Webmail versions 1.5.0 through 1.6.10. The exploit leverages a deserialization vulnerability to achieve remote code execution by uploading a malicious gadget via an image upload feature.
Classification
Working Poc 95%
Target:
Roundcube Webmail 1.5.0 - 1.6.10
Auth required
Prerequisites:
Valid Roundcube credentials · Network access to the target · PHP environment to run the exploit
nomisec
WRITEUP
by CyberQuestor-infosec · poc
https://github.com/CyberQuestor-infosec/CVE-2025-49113-Roundcube_1.6.10
This repository provides a detailed technical writeup for CVE-2025-49113, an authenticated remote code execution vulnerability in Roundcube 1.6.10. It includes lab setup instructions, exploit usage, and mitigation steps, but does not contain actual exploit code.
Classification
Writeup 90%
Target:
Roundcube 1.6.10
Auth required
Prerequisites:
Valid user credentials for Roundcube · Access to the Roundcube web interface
nomisec
WORKING POC
by hackmelocal · poc
https://github.com/hackmelocal/CVE-2025-49113-Simulation
This repository provides a containerized lab environment to simulate and exploit CVE-2025-49113, a post-authentication RCE vulnerability in Roundcube Webmail caused by PHP object deserialization. It includes a vulnerable Roundcube instance and instructions for exploitation.
Classification
Working Poc 90%
Target:
Roundcube Webmail 1.6.10
Auth required
Prerequisites:
Docker and Docker Compose installed · Authenticated access to Roundcube Webmail
nomisec
WORKING POC
by punitdarji · remote-auth
https://github.com/punitdarji/roundcube-cve-2025-49113
This repository contains a functional exploit for CVE-2025-49113, a post-authentication RCE vulnerability in Roundcube ≤ 1.6.10 via PHP object deserialization. The PoC includes authentication, CSRF token handling, payload injection, and execution steps.
Classification
Working Poc 95%
Target:
Roundcube ≤ 1.6.10
Auth required
Prerequisites:
Valid Roundcube credentials · Access to the Roundcube web interface
nomisec
WRITEUP
by 5kr1pt · poc
https://github.com/5kr1pt/Roundcube_CVE-2025-49113
This repository provides a detailed technical analysis of CVE-2025-49113, a post-authentication RCE vulnerability in Roundcube Webmail. It includes a timeline, root cause analysis, mitigation steps, and a step-by-step exploit walkthrough using a referenced PoC.
Classification
Writeup 95%
Target:
Roundcube Webmail ≤ 1.5.10 / 1.6.10
Auth required
Prerequisites:
Valid Roundcube credentials · Access to the settings/upload endpoint
vulncheck_xdb
WORKING POC
remote-auth
https://github.com/lcfr-eth/exploits
This repository contains a functional Python exploit for CVE-2025-49113, targeting Roundcube Webmail <= 1.6.10 via PHP object deserialization. The exploit includes authentication, file upload, and shell execution capabilities.
Classification
Working Poc 95%
Target:
Roundcube Webmail <= 1.6.10
Auth required
Prerequisites:
valid Roundcube credentials · network access to target
metasploit
WORKING POC
EXCELLENT
by Maksim Rogov, Kirill Firsov · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/roundcube_auth_rce_cve_2025_49113.rb
This Metasploit module exploits a PHP object deserialization vulnerability in Roundcube Webmail (CVE-2025-49113) to achieve remote code execution. It authenticates, uploads a malicious payload via a crafted `_from` parameter, and executes arbitrary commands as the web server user.
Classification
Working Poc 100%
Target:
Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11
Auth required
Prerequisites:
Valid Roundcube credentials · Network access to the target