
A critical vulnerability identified as CVE-2025-49113 in Roundcube Webmail software is actively being exploited worldwide, with approximately 84,000 unpatched instances reported. This flaw permits remote code execution by authenticated users and has been frequently targeted by potential state-sponsored actors. Marwan Hachem, COO of FearsOff Cybersecurity, emphasized the national security risks posed by this vulnerability, urging governments and major institutions to implement urgent updates as exploit code has become publicly available. In addition to Roundcube, two critical vulnerabilities have been detected in Erlang/OTP SSH, one allowing remote code execution without credentials and another enabling email theft via cross-site scripting (XSS). Furthermore, a major flaw in the PayU WordPress plugin has been discovered, enabling attackers to hijack accounts on approximately 5,000 WordPress sites without requiring login credentials. Researchers also reported multiple previously unknown security flaws in open-source projects, including a vulnerability in the Linux Kernel USB protocol stack. These developments highlight ongoing cybersecurity threats across widely used software platforms.
๐จ Two critical vulnerabilities in Erlang/OTP SSH and Roundcube Webmail are actively exploitedโone allows remote code execution without credentials, the other email theft via XSS. Plus, a major WordPress plugin flaw lets attackers hijack any account without logging in. Details https://t.co/ONGd5JtVS5
Over 84,000 Roundcube instances vulnerable to actively exploited flaw https://t.co/UbGszE0CLV
๐๐ซ๐ ๐ฎ๐ฌ๐๐: ๐๐ฎ๐ฅ๐ญ๐ข-๐๐ ๐๐ง๐ญ ๐๐ซ๐๐ก๐ข๐ญ๐๐๐ญ๐ฎ๐ซ๐ ๐๐จ๐ซ ๐๐ฎ๐ญ๐จ๐ฆ๐๐ญ๐๐ ๐๐ฎ๐ฅ๐ง๐๐ซ๐๐๐ข๐ฅ๐ข๐ญ๐ฒ ๐๐ข๐ฌ๐๐จ๐ฏ๐๐ซ๐ฒ Found a vulnerability in the Linux Kernel USB protocol stack. + 15 previously unknown security flaws in real world open source projects. Argusee https://t.co/bioVMYPXxS

