Header image

Actively Exploited Roundcube Flaw has Widespread Coverage

The flaw arose from PHP object deserialisation and session corruption.

Attacks exploiting a critical remote code execution vulnerability in Roundcube webmail could compromise 84,925 instances around the world.

According to BleepingComputer and the Shadowserver Foundation, the flaw arose from PHP object deserialisation and session corruption caused by unsanitised input, has been undetected for more than a decade and affects all Roundcube versions 1.1.0 to 1.6.10.

With log scraping, brute-force, and cross-site request forgery attacks enabling credential theft while circumventing authentication, organizations have been urged to immediately update to versions 1.6.11 and 1.5.10 released earlier this month to prevent potential compromise.


Dan Raywood
Dan Raywood

Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.

Dan Raywood
Dan Raywood

Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.

Upcoming Events

No events found.