{"uuid": "d3557742-8818-41cf-8859-9f22e632f444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49113", "type": "published-proof-of-concept", "source": "https://t.me/BugCod3/1134", "content": "CVE-2025-49113 - Roundcube Remote Code Execution\n\nA proof-of-concept exploit for CVE-2025-49113, a remote code execution vulnerability in Roundcube Webmail.\n\n\ud83d\udcac Description:\nThis exploit targets a deserialization vulnerability in Roundcube Webmail versions 1.5.0 through 1.6.10. The vulnerability allows an authenticated attacker to execute arbitrary code on the server.\n\n\ud83c\udff4\u200d\u2620\ufe0f Vulnerable Versions:\n\u26aa\ufe0f 1.5.0 - 1.5.9\n\u26aa\ufe0f 1.6.0 - 1.6.10\n\n\ud83d\udd87 Requirements:\n\u26aa\ufe0f PHP 7.0 or higher\n\u26aa\ufe0f cURL extension enabled\n\u26aa\ufe0f Target running a vulnerable version of Roundcube\n\n\ud83d\udcbb Usage: \nphp CVE-2025-49113.php    \n\n\ud83d\udd3c Example:\nphp CVE-2025-49113.php http://localhost/roundcube/ admin password \"id\"\n\nGithub\n\n\u2b07\ufe0f Download\n\ud83d\udd12 BugCod3\n\n#CVE #PHP #RemoteCode\n\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\n\ud83d\udc64 T.me/BugCod3BOT \n\ud83d\udce3 T.me/BugCod3", "creation_timestamp": "2025-06-11T12:04:10.000000Z"}