• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa adds two actively exploited roundcube flaws to kev catalog

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

You are here: Home / General Cyber Security News / CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
February 21, 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerabilities in question are listed below –

  • CVE-2025-49113 (CVSS score: 9.9) – A deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php. (Fixed in June 2025)
  • CVE-2025-68461 (CVSS score: 7.2) – A cross-site scripting vulnerability via the animate tag in an SVG document. (Fixed in December 2025)

Cybersecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Dubai-based cybersecurity company FearsOff, whose founder and CEO, Kirill Firsov, was credited with discovering and reporting CVE-2025-49113, said attackers have already “diffed and weaponized the vulnerability” within 48 hours of public disclosure of the flaw. An exploit for the vulnerability was subsequently made available for sale on June 4, 2025.

Firsov also noted that the shortcoming can be triggered reliably on default installations, and that it had been hidden in the codebase for over 10 years.

There are no details on who is behind the exploitation of the two Roundcube flaws. But multiple vulnerabilities in the email software have been weaponized by nation-state threat actors like APT28 and Winter Vivern.

Federal Civilian Executive Branch (FCEB) agencies are to remediate identified vulnerabilities by March 13, 2026, to secure their networks against the active threat.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «beyondtrust flaw used for web shells, backdoors, and data exfiltration BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
  • BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
  • Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems
  • ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT
  • Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
  • Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case
  • FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025
  • Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran
  • INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
  • Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

Copyright © TheCyberSecurity.News, All Rights Reserved.