CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住关键点。 文章主要讲的是美国网络安全和基础设施安全局(CISA)将两个影响Roundcube邮件软件的安全漏洞加入到已知被利用的漏洞目录中。这两个漏洞分别是CVE-2025-49113和CVE-2025-68461,CVSS评分分别为9.9和7.2。前者允许经过身份验证的用户通过未验证的URL参数进行远程代码执行,后者则是跨站脚本漏洞。 接下来,文章提到迪拜的网络安全公司FearsOff的创始人发现了CVE-2025-49113,并指出攻击者在漏洞公开后48小时内就将其武器化,并在6月4日开始出售利用工具。此外,该漏洞存在于代码库中超过10年,并且可以在默认安装下可靠触发。 还有提到这些漏洞可能被国家支持的威胁行为者如APT28和Winter Vivern利用。最后,联邦民事执行机构需要在2026年3月13日前修复这些漏洞以应对威胁。 现在,我需要将这些信息浓缩到100字以内。重点包括CISA添加了两个Roundcube漏洞到KEV目录,详细说明每个漏洞的影响和评分,FearsOff公司的发现和攻击者的快速行动,以及修复截止日期。 可能会忽略一些细节,比如具体的利用方式和历史时间长度,但要确保主要信息都涵盖进去。 </think> 美国网络安全机构CISA将影响Roundcube邮件软件的两个安全漏洞加入已知被利用目录。其中CVE-2025-49113(CVSS 9.9)允许远程代码执行,CVE-2025-68461(CVSS 7.2)为跨站脚本漏洞。迪拜公司FearsOff创始人发现前者,并指出攻击者迅速将其武器化并出售利用工具。该漏洞存在于代码库超十年,默认安装下可触发。修复截止日期为2026年3月13日。 2026-2-21 07:21:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Vulnerability / Patch Management

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerabilities in question are listed below -

  • CVE-2025-49113 (CVSS score: 9.9) - A deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php. (Fixed in June 2025)
  • CVE-2025-68461 (CVSS score: 7.2) - A cross-site scripting vulnerability via the animate tag in an SVG document. (Fixed in December 2025)

Dubai-based cybersecurity company FearsOff, whose founder and CEO, Kirill Firsov, was credited with discovering and reporting CVE-2025-49113, said attackers have already "diffed and weaponized the vulnerability" within 48 hours of public disclosure of the flaw. An exploit for the vulnerability was subsequently made available for sale on June 4, 2025.

Firsov also noted that the shortcoming can be triggered reliably on default installations, and that it had been hidden in the codebase for over 10 years.

There are no details on who is behind the exploitation of the two Roundcube flaws. But multiple vulnerabilities in the email software have been weaponized by nation-state threat actors like APT28 and Winter Vivern.

Federal Civilian Executive Branch (FCEB) agencies are to remediate identified vulnerabilities by March 13, 2026, to secure their networks against the active threat.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/cisa-adds-two-actively-exploited.html
如有侵权请联系:admin#unsafe.sh