vulnerability
Zimbra Collaboration: CVE-2025-27915: This patch fixes a critical security vulnerability.
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:M/Au:S/C:P/I:P/A:N) | Mar 12, 2025 | Mar 18, 2025 | Oct 8, 2025 |
Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:N)
Published
Mar 12, 2025
Added
Mar 18, 2025
Modified
Oct 8, 2025
Description
An issue was discovered in zimbra collaboration (zcs) 9.0 and 10.0 and 10.1. a stored cross-site scripting (xss) vulnerability exists in the classic web client due to insufficient sanitization of html content in ics files. when a user views an e-mail message containing a malicious ics entry, its embedded javascript executes via an ontoggle event inside a <details> tag. this allows an attacker to run arbitrary javascript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. as a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
Solution
zimbra-collaboration-upgrade-latest
References
- CWE-79
- CVE-2025-27915
- https://attackerkb.com/topics/CVE-2025-27915
- URL-https://wiki.zimbra.com/wiki/Security_Center
- URL-https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.13#Security_Fixes
- URL-https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.5#Security_Fixes
- URL-https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P44#Security_Fixes
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.