The developers of Roundcube Webmail, one of the world’s most popular open-source webmail platforms, have released urgent security updates in versions 1.6.11 and 1.5.10 to address a critical remote code execution (RCE) vulnerability.
The flaw, reported by security researcher firs0v, could allow authenticated attackers to execute arbitrary code on vulnerable servers via PHP Object Deserialization, putting countless email servers at risk.
The Vulnerability: Post-Auth RCE via PHP Object Deserialization
PHP object deserialization vulnerabilities have long been a favored attack vector, especially in PHP-based platforms handling user-supplied data.
In this case, the Roundcube team patched an issue where, after successful authentication, a maliciously crafted payload could be supplied to trigger deserialization of untrusted data.
This would allow an attacker to instantiate arbitrary PHP objects, leading to remote execution of code on the underlying server.
Technical Overview:
- Attack Vector: Post-authentication (requires valid user login)
- Impact: Arbitrary code execution with web server privileges
- Affected Versions: Roundcube 1.6.x and 1.5.x before 1.6.11/1.5.10
- Patched in: 1.6.11 and 1.5.10
How Did the Vulnerability Work?
PHP’s unserialize() function can be dangerous if used with untrusted input. When application logic deserializes user-controllable data, attackers can craft serialized objects that exploit “magic methods” (e.g., __wakeup, __destruct) or known gadget chains in the application or underlying libraries.
For example, the exploit could look like this in a simplified way:
php// Vulnerable pseudocode
$userObj = unserialize($_POST['user']);
If $_POST['user'] contained a malicious object definition, this could lead to execution of arbitrary code.
While the Roundcube team did not publish exploit specifics (in line with responsible disclosure), administrators are urged to assume exploitation is trivial for skilled attackers and act immediately.
Urgent Mitigation: Update Your Roundcube Installation
The Roundcube team has released version 1.6.11 and 1.5.10, both considered stable. These versions address the critical deserialization bug and also include several minor bug fixes and improvements:
Security Update Procedure
- Backup Your Data: Always create a full backup of Roundcube files and the database before upgrading.
- Update Immediately: Download and install the patched version from Roundcube’s official Github.
- Verify Upgrade: After applying the update, verify version numbers and test basic functionality.
Alongside the RCE mitigation, the update includes:
- Improved MANAGESIEVE match-type selector
- Fixes for PHP warnings and color bugs in HTML mail preview (Dark Mode)
- Better handling of LDAP, redis, and memcache connections
- OAuth token refresh improvements
- Several minor security and stability fixes
Example Changelog Snippet:
- Fix Post-Auth RCE via PHP Object Deserialization reported by firs0v.
- Fix bug where attachments with content type of application/vnd.ms-tnef were not parsed.
- Improve installer to clarify options for disabling SMTP authentication.
Exploitation of authentication-gated vulnerabilities is widespread, as attackers may leverage stolen credentials to pivot into deeper exploitation particularly on shared or multi-tenant email servers. Historical incidents show that attackers often chain authentication bypass bugs with deserialization RCEs, making quick patching especially crucial.
Roundcube is a core component in thousands of enterprise and academic mail systems. A successful compromise could expose sensitive communications, allow further lateral movement, or enable destructive attacks like ransomware deployment via email.
Key Recommendations
- Apply the security upgrade immediately, even if your instance is not Internet-facing.
- Audit server logs for unusual post-authentication activity.
- Review and restrict user account privileges where feasible.





