CVE-2026-35537
⚪ Do wiadomości
Niebezpieczna deserializacja w Roundcube Webmail pozwala nieautoryzowanym atakującym na zapis dowolnych plików.
CVSS
3.7
EPSS
0.0%
Exploit
none
Vendor
roundcube
Opis źródłowy (NVD)
An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsafe deserialization in the redis/memcache session handler may lead to arbitrary file write operations by unauthenticated attackers via crafted session data.
deserialization
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 3.7 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-03 04:17:10 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-13 17:54:32 UTC |
Referencje
- https://github.com/roundcube/roundcubemail/commit/618c5428edc69fb088e7ac6c89e506dd39df3 (cve@mitre.org) [Patch]
- https://github.com/roundcube/roundcubemail/commit/6d586cfa4d8a31f7957f7a445aaedd52592a0e74 (cve@mitre.org) [Patch]
- https://github.com/roundcube/roundcubemail/commit/a4ead994d2f0ea92e4a1603196a197e0d5df1620 (cve@mitre.org) [Patch]
- https://github.com/roundcube/roundcubemail/releases/tag/1.5.14 (cve@mitre.org) [Release Notes]
- https://github.com/roundcube/roundcubemail/releases/tag/1.6.14 (cve@mitre.org) [Release Notes]
- https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc5 (cve@mitre.org) [Release Notes]
- https://roundcube.net/news/2026/03/18/security-updates-1.7-rc5-1.6.14-1.5.14 (cve@mitre.org) [Third Party Advisory]
- http://www.openwall.com/lists/oss-security/2026/04/11/6 (af854a3a-2127-422b-91ae-364da2661108) [Issue Tracking, Mailing List]