ThreatVision 全新升級!帶您掌握威脅情勢,了解關鍵資安風險與脈絡
威脅情資

CVE-2025-49113: Roundcube Webmail 漏洞

2025.09.14Cyber Threat Intelligence
Share:
本文改寫自 TeamT5〈 2025 年 6月第二期的漏洞情資報告(June H2 Vulnerability Insights Report)〉。 TeamT5 漏洞研究團隊致力於針對重大漏洞提供即時的應對措施與緩解方案。如欲進一步了解 TeamT5 的漏洞情資報告,請與我們聯繫
CVE-2025-49113 in Roundcube Webmail
TeamT5 偵測到 Roundcube Webmail 的一個重大漏洞(CVE-2025-49113)遭到中國關聯的 APT 組織 CamoFei 積極利用。其最早的攻擊可追溯至 2025 年 4 月。
CamoFei 在入侵後,部署網頁後門與惡意程式,包括開源的網頁後門 Godzilla 與遠端存取木馬 Pupy。受害者包含台灣的教育機構,及巴基斯坦、緬甸的政府機構。
本文詳細說明攻擊手法與情況。
The following blog post is based on our June H2 Vulnerability Insights Report. TeamT5 Vulnerability Research Team is dedicated to providing timely mitigation and response guidelines to critical vulnerabilities. Contact us for more information about our vulnerability intelligence.

Active Exploitation of CVE-2025-49113 in Roundcube Webmail

TeamT5 has detected that a critical vulnerability (CVE-2025-49113) in Roundcube Webmail was actively exploited by China-nexus APT group CamoFei. The earliest exploitation can be traced back to April 2025. CamoFei deployed webshell and malware after successful exploitation, including open-source webshell Godzilla and shared RAT Pupy. The victims included educational institutions in Taiwan and government agencies in Pakistan and Myanmar.
We conclude the attacks in Exploitation Status below.

Executive Summary

We assess the severity level of CVE-2025-49113 as critical and urge our customers to use this report to mitigate the effects. CVE-2025-49113 is a post-authentication PHP object deserialization vulnerability with a CVSS score of 9.9. Threat actors with compromised Roundcube Webmail account can exploit CVE-2025-49113 to achieve remote code execution and implant malware.
Roundcube released the patch for CVE-2025-49113 on June 1, 2025.[1] Similarly, public report[2] with root cause analysis and Proof-of-Concept[3] of the vulnerability was circulated in the wild. The vulnerability affected Roundcube Webmail prior to 1.6.11 or 1.5.10. As of June 21, our research suggests that there are more than 8,000 Roundcube Webmail devices are vulnerable to CVE-2025-49113 in APAC region, including over 4,000 devices in Japan, 2,500 devices in Singapore, and hundreds of devices in Taiwan, South Korea, and Vietnam.
Based on our investigation and the current exploitation status of CVE-2025-49113, we depicted the Forensic Artifacts in this report. We also concluded the malware and IoC in Appendix I: Malware Table and Appendix II: Indicators of Compromise (IoC). Most importantly, we prepare a comprehensive Mitigation and Response Advisory for our customers.
The Mitigation and Response Advisory includes:
  • Official Information
  • Threat Hunting Tools: Vulnerability Scanner.

Exploitation Status

CVE-2025-49113 has been actively exploited by China-nexus APT group CamoFei since April 2025.
  • CamoFei exploited the vulnerabilities in attacks against educational institutions in Taiwan and government agencies in Pakistan and Myanmar.
  • In the attacks, CamoFei deployed open-source webshell Godzilla[4 & 5] and shared RAT Pupy[6].
  • The C2 of the malware is repos.seuweb.com

Mitigation and Response Advisory

1. Official Information

Threat actors with compromised Roundcube Webmail account can exploit CVE-2025-49113 to achieve remote code execution and implant malware.
Roundcube has released patch for CVE-2025-49113 on June 1 2025. We highly recommend our client and partner to update the Roundcube Webmail devices to version 1.6.11 or 1.5.10.

2. Threat Hunting Tools

As of June 21, our research suggests that there are more than 8,000 Roundcube Webmail devices are vulnerable to CVE-2025-49113, including over 4,000 devices in Japan, 2,500 devices in Singapore, and hundreds of devices in Taiwan, South Korea, and Vietnam in APAC region.
Our vulnerability research team prepares a vulnerability scanner for our client and partner to check if your Roundcube devices are vulnerable to CVE-2025-49113.
The vulnerability scanner can be downloaded from Threat Hunting Tools[7].

Forensic Artifacts

Given that CVE-2025-49113 is a post-authentication vulnerability, the threat actors have to first obtain a leak credential of Roundcube Webmail account. Threat actors with compromised Roundcube Webmail account can exploit CVE-2025-49113, which will generate the deserialized payload in apache log.
  • The deserialized payload has a format similar to _from=edit-%21%C0%22%C0%3B%....
  • The defaulted path of apache logs is /var/log/apache2/other_vhosts_access.log.
  • The log will be as follow:
roundcube.local:80 192.168.1.2 - - [30/Jun/2025:08:01:21 +0000] "GET // HTTP/1.1" 200 37999 "-" "-"
roundcube.local:80 192.168.1.2 - - [30/Jun/2025:08:01:21 +0000] "GET //?_task=logout&_token=Xlh5DX0uGrkcJ7bhEcbyeLfryWgnsndF HTTP/1.1" 200 6068 "-" "-"
roundcube.local:80 192.168.1.2 - - [30/Jun/2025:09:18:22 +0000] "GET // HTTP/1.1" 200 5856 "-" "-"
roundcube.local:80 192.168.1.2 - - [30/Jun/2025:09:18:22 +0000] "POST //?_task=login HTTP/1.1" 302 723 "-" "-"
roundcube.local:80 192.168.1.2 - - [30/Jun/2025:09:18:22 +0000] "POST //?_from=edit-%21%C0%22%C0%3B%C0i%C0%3A%C00%C0%3B%C0O%C0%3A%C01%C06%C0%3A%C0%22%C0C%C0r%C0y%C0p%C0t%C0_%C0G%C0P%C0G%C0_%C0E%C0n%C0g%C0i%C0n%C0e%C0%22%C0%3A%C01%C0%3A%C0%7B%C0S%C0%3A%C02%C06%C0%3A%C0%22%C0%5C%C00%C00%C0C%C0r%C0y%C0p%C0t%C0_%C0G%C0P%C0G%C0_%C0E%C0n%C0g%C0i%C0n%C0e%C0%5C%C00%C00%C0_%C0g%C0p%C0g%C0c%C0o%C0n%C0f%C0%22%C0%3B%C0S%C0%3A%C02%C01%C0%3A%C0%22%C0w%C0h%C0o%C0a%C0m%C0i%C0+%C0%3E%C0+%C0%2F%C0t%C0m%C0p%C0%2F%C0p%C0w%C0n%C0e%C0d%C0%3B%C0%23%C0%22%C0%3B%C0%7D%C0i%C0%3A%C00%C0%3B%C0b%C0%3A%C00%C0%3B%C0%7D%C0%22%C0%3B%C0%7D%C0%7D%C0&_task=settings&_framed=1&_remote=1&_id=1&_uploadid=1&_unlock=1&_action=upload HTTP/1.1" 200 835 "-" "-"
Notably, as of June 21, our research suggests that there are more than 8,000 Roundcube Webmail devices are vulnerable to CVE-2025-49113 in APAC region, including over 4,000 devices in Japan, 2,500 devices in Singapore, and hundreds of devices in Taiwan, South Korea, and Vietnam:
CountryVulnerable
JP4087
TW416
SG2566
KR348
VN719
We therefore highly recommend our client and partner use the vulnerability scanner in Threat Hunting Tools[7] to check if your Roundcube Webmail devices are vulnerable to CVE-2025-49113.

Appendix I: Malware Table

Malware Table introduces the malware mentioned in this report.
NameTypeDescriptionAttributionFirst Seen
GodzillaWebshellGodzilla is an open-source webshell which has been used by different cyber-espionage and cyber-crime actors, especially the Chinese actors. Godzilla webshell is often used after actors successfully exploit web vulnerabilities and compromise the web server.Open-source2020.01
PupyRATPupy is a cross-platform, multi function RAT and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple transports, migrate into processes using reflective injection, and load remote python code, python packages and python C-extensions from memory.Shared2015.01

Appendix II: Indicators of Compromise (IoC)

repos.seuweb.com

68e8083b9dbbfdaf6a59f9edede4febd20f88eba3eb0ea8bb8046d96411d450b
a59e93bf140192089d30f676285d96204f07ca21550aca4d0ca33ba9697c161b
84771d855307aaee497ad14b5b56189235bd88f56cc654cab32ecabde2f56dfb

Appendix III: Other critical CVEs

Patch Management Report (PMR). Published every week (or more), the PMR will provide our customers with concise yet comprehensive updates on the most critical and exploitable vulnerabilities selected by TeamT5 vulnerability research team during the period. Each vulnerability will be provided with patch information. If you are interested in subscribing to this new report series, please contact TeamT5 for more information.*

[1] Security updates 1.6.11 and 1.5.10 released https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10
[2] Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization [CVE-2025-49113] https://fearsoff.org/research/roundcube
[4] SHA-256: 68e8083b9dbbfdaf6a59f9edede4febd20f88eba3eb0ea8bb8046d96411d450b
[5] SHA-256: a59e93bf140192089d30f676285d96204f07ca21550aca4d0ca33ba9697c161b
[6] SHA-256: 84771d855307aaee497ad14b5b56189235bd88f56cc654cab32ecabde2f56dfb
2025.09.14Cyber Threat Intelligence
Share:

Related Post

為提供您最佳的服務體驗,本網站使用 Cookies。當您使用本網站,即表示您同意 Cookies 技術支援。更多資訊請參閱隱私權與Cookies使用政策。