A new security vulnerability was found in Roundcube:
https://nvd.nist.gov/vuln/detail/CVE-2025-49113
The effected versions:
all versions before 1.5.10
all 1.6.x versions before 1.6.11
The most recent versions of Roundcube include the patch:
https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10
CWP uses Roundcube 1.4.x therefore it is highly recommended to update Roundcube
Instructions how to update Roundcube to 1.5.11:
cd /usr/local/cwpsrv/var/services
cp -R roundcube roundcube_backup
wget https://github.com/roundcube/roundcubemail/releases/download/1.5.11/roundcubemail-1.5.11-complete.tar.gz
tar -xvzf roundcubemail-1.5.11-complete.tar.gz
cd roundcubemail-1.5.11
bin/installto.sh /usr/local/cwpsrv/var/services/roundcube
cd ..
chown -R cwpsvc:cwpsvc roundcube
rm -rf roundcubemail-1.5.11*
Please note you do it on your own risk.
I had a problem with it.
Seems CWP is running php-7.2.30 without php-intl extension.
Roundcube needs this extension to detect Spoofing.
The solution for this was to change
/usr/local/cwpsrv/conf.d/webmail.conf
/usr/local/cwpsrv/conf/cwp_services.conf
fastcgi_pass unix:/usr/local/cwp/php71/var/sockets/cwpsvc.sock;
to
fastcgi_pass unix:/opt/alt/php-fpm81/usr/var/sockets/cwpsvc.sock;
fastcgi_param PHP_ADMIN_VALUE "open_basedir = /usr/local/cwpsrv/var/services/roundcube/:/tmp/:/usr/local/cwp/php71/lib/";
to
fastcgi_param PHP_ADMIN_VALUE "open_basedir = /usr/local/cwpsrv/var/services/roundcube/:/tmp/:/usr/local/cwp/php71/lib/:/opt/alt/php-fpm82/usr/";
However this didn't catch it all. When you go to it through https://<your_server/webmail, you still ended up with php-7.2.30.
The version on port 2096 was OK, so I also changed the first lines of roundcube/index.php.
<?php
if (!preg_match("/:2096/",$_SERVER['HTTP_HOST'])) header('Location: https://<your_server>:2096/');