JustAppSec
Back to news

Roundcube fixes pre-auth file write via session deserialization

2 min readPublished 11 Apr 2026Source: Openwall oss-security mailing list

TL;DR — Unsafe deserialization in Roundcube’s redis/memcache session handler can enable unauthenticated arbitrary file writes, and an oss-security post points teams to patched Roundcube security releases.

What happened

Roundcube is a widely deployed open-source webmail frontend used to provide browser access to IMAP/SMTP mail systems.

An oss-security mailing list post summarizes Roundcube’s March 18, 2026 security releases and calls out a pre-auth arbitrary file write caused by unsafe deserialization in the redis/memcache session handler (tracked as CVE-2026-35537). The CVE description states that unauthenticated attackers can trigger arbitrary file write operations via crafted session data.

ItemSource value
Affected softwareRoundcube Webmail
Vulnerability classUnsafe deserialization (CWE-502)
Impact (CVE)Unauthenticated arbitrary file write via crafted session data
Affected versions (CVE record)< 1.5.14 and < 1.6.14
Fix vehicles mentioned in sourcesRoundcube security releases 1.5.14, 1.6.14 (and 1.7-rc5 referenced in Roundcube’s announcement)

Even when scored conservatively, pre-auth file write in an internet-facing webmail app is operationally high-risk: it’s the kind of primitive that can enable follow-on compromise depending on deployment specifics (writable paths, webroot adjacency, and runtime hardening). The same release announcement also lists multiple additional web-exposure-relevant fixes (XSS, SSRF, and CSRF-bypass categories), reinforcing that this is a “review your exposure and patch” moment for Roundcube operators.

Who is impacted

  • Organizations running Roundcube Webmail where deployed versions fall into the CVE record’s affected ranges (versions before 1.5.14 and before 1.6.14).
  • Internet-reachable Roundcube deployments using redis or memcache-backed session handling, where attacker-controlled session data could reach the unsafe deserialization path.
  • Teams that rely on Roundcube’s web UI as an externally accessible entry point (common in hosted mail, enterprise webmail, and shared services).

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing.

    "We strongly recommend to update your productive installations of Roundcube with this new versions."

  • Inventory Roundcube instances and determine the exact deployed version(s), including container images and baked VM artifacts.
  • If you can’t patch immediately, treat this as a potential integrity exposure and reduce blast radius where feasible (e.g., validate that the web user cannot write to sensitive host paths; ensure uploads/cache/temp directories are appropriately isolated).
  • After patching, review perimeter logs and application telemetry for anomalous unauthenticated activity that could indicate probing of session-handling paths.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.