{"id":43834,"date":"2026-02-21T23:09:22","date_gmt":"2026-02-21T15:09:22","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/21\/cisa-adds-two-actively-exploited-roundcube-flaws-to-kev-catalog\/"},"modified":"2026-02-21T23:09:22","modified_gmt":"2026-02-21T15:09:22","slug":"cisa-adds-two-actively-exploited-roundcube-flaws-to-kev-catalog","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/21\/cisa-adds-two-actively-exploited-roundcube-flaws-to-kev-catalog\/","title":{"rendered":"CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtZg49iJDSf0QXV_lj9uqgkcevxHhncfWJrejyCIdGb2hlzcVefAWXETqflE7uEUTuAGKkqfSpa9_w1FoNTZ-67YU4H-iUio2DfhF7o2qIMIbx8BewvMG8rHsq8eh7gBwjVckasb5Qj8jsGY_3wRjBaYTh-nL10wAWFI5PbCu62cfJFk9Y8ucUBDyQNkEh\/s1600\/roundcube.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtZg49iJDSf0QXV_lj9uqgkcevxHhncfWJrejyCIdGb2hlzcVefAWXETqflE7uEUTuAGKkqfSpa9_w1FoNTZ-67YU4H-iUio2DfhF7o2qIMIbx8BewvMG8rHsq8eh7gBwjVckasb5Qj8jsGY_3wRjBaYTh-nL10wAWFI5PbCu62cfJFk9Y8ucUBDyQNkEh\/s1600\/roundcube.jpg\" alt=\"CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog\"\/><\/a><\/div>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/02\/20\/cisa-adds-two-known-exploited-vulnerabilities-catalog\" rel=\"noopener\" target=\"_blank\">added<\/a> two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" rel=\"noopener\" target=\"_blank\">KEV<\/a>) catalog, citing evidence of active exploitation.<\/p>\n<p>The vulnerabilities in question are listed below &#8211;<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-49113\" rel=\"noopener\" target=\"_blank\">CVE-2025-49113<\/a><\/strong> (CVSS score: 9.9) &#8211; A deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program\/actions\/settings\/upload.php. (Fixed in <a href=\"https:\/\/thehackernews.com\/2025\/06\/critical-10-year-old-roundcube-webmail.html\" rel=\"noopener\" target=\"_blank\">June 2025<\/a>)<\/li>\n<li><strong><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-68461\" rel=\"noopener\" target=\"_blank\">CVE-2025-68461<\/a><\/strong> (CVSS score: 7.2) &#8211; A cross-site scripting vulnerability via the animate tag in an SVG document. (Fixed in <a href=\"https:\/\/roundcube.net\/news\/2025\/12\/13\/security-updates-1.6.12-and-1.5.12\" rel=\"noopener\" target=\"_blank\">December 2025<\/a>)<\/li>\n<\/ul>\n<p>Dubai-based cybersecurity company FearsOff, whose founder and CEO, Kirill Firsov, was credited with discovering and reporting CVE-2025-49113, said attackers have already &#8220;<a href=\"https:\/\/fearsoff.org\/research\/roundcube\" rel=\"noopener\" target=\"_blank\">diffed and weaponized the vulnerability<\/a>&#8221; within 48 hours of public disclosure of the flaw. An exploit for the vulnerability was subsequently <a href=\"https:\/\/x.com\/k_firsov\/status\/1930246402099044789\" rel=\"noopener\" target=\"_blank\">made available<\/a> for sale on June 4, 2025.<\/p>\n<p>Firsov also noted that the shortcoming can be triggered reliably on default installations, and that it had been hidden in the codebase for over 10 years.<\/p>\n<p>There are no details on who is behind the exploitation of the two Roundcube flaws. But multiple vulnerabilities in the email software have been <a href=\"https:\/\/thehackernews.com\/2025\/06\/critical-10-year-old-roundcube-webmail.html\" rel=\"noopener\" target=\"_blank\">weaponized<\/a> by nation-state threat actors like APT28 and Winter Vivern.<\/p>\n<p>Federal Civilian Executive Branch (FCEB) agencies are to remediate identified vulnerabilities by March 13, 2026, to secure their networks against the active threat.<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-43834","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43834"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43834\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}