5.4

CVE-2025-27915

Warnung
Exploit
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SynacorZimbra Collaboration Suite Version >= 10.0.0 < 10.0.13
SynacorZimbra Collaboration Suite Version >= 10.1.0 < 10.1.5
SynacorZimbra Collaboration Suite Version9.0.0 Update-
SynacorZimbra Collaboration Suite Version9.0.0 Updatep1
SynacorZimbra Collaboration Suite Version9.0.0 Updatep10
SynacorZimbra Collaboration Suite Version9.0.0 Updatep11
SynacorZimbra Collaboration Suite Version9.0.0 Updatep12
SynacorZimbra Collaboration Suite Version9.0.0 Updatep13
SynacorZimbra Collaboration Suite Version9.0.0 Updatep14
SynacorZimbra Collaboration Suite Version9.0.0 Updatep15
SynacorZimbra Collaboration Suite Version9.0.0 Updatep16
SynacorZimbra Collaboration Suite Version9.0.0 Updatep17
SynacorZimbra Collaboration Suite Version9.0.0 Updatep18
SynacorZimbra Collaboration Suite Version9.0.0 Updatep19
SynacorZimbra Collaboration Suite Version9.0.0 Updatep2
SynacorZimbra Collaboration Suite Version9.0.0 Updatep20
SynacorZimbra Collaboration Suite Version9.0.0 Updatep21
SynacorZimbra Collaboration Suite Version9.0.0 Updatep22
SynacorZimbra Collaboration Suite Version9.0.0 Updatep23
SynacorZimbra Collaboration Suite Version9.0.0 Updatep24
SynacorZimbra Collaboration Suite Version9.0.0 Updatep24.1
SynacorZimbra Collaboration Suite Version9.0.0 Updatep25
SynacorZimbra Collaboration Suite Version9.0.0 Updatep26
SynacorZimbra Collaboration Suite Version9.0.0 Updatep27
SynacorZimbra Collaboration Suite Version9.0.0 Updatep28
SynacorZimbra Collaboration Suite Version9.0.0 Updatep29
SynacorZimbra Collaboration Suite Version9.0.0 Updatep3
SynacorZimbra Collaboration Suite Version9.0.0 Updatep30
SynacorZimbra Collaboration Suite Version9.0.0 Updatep31
SynacorZimbra Collaboration Suite Version9.0.0 Updatep32
SynacorZimbra Collaboration Suite Version9.0.0 Updatep33
SynacorZimbra Collaboration Suite Version9.0.0 Updatep34
SynacorZimbra Collaboration Suite Version9.0.0 Updatep35
SynacorZimbra Collaboration Suite Version9.0.0 Updatep36
SynacorZimbra Collaboration Suite Version9.0.0 Updatep37
SynacorZimbra Collaboration Suite Version9.0.0 Updatep38
SynacorZimbra Collaboration Suite Version9.0.0 Updatep39
SynacorZimbra Collaboration Suite Version9.0.0 Updatep4
SynacorZimbra Collaboration Suite Version9.0.0 Updatep40
SynacorZimbra Collaboration Suite Version9.0.0 Updatep41
SynacorZimbra Collaboration Suite Version9.0.0 Updatep42
SynacorZimbra Collaboration Suite Version9.0.0 Updatep43
SynacorZimbra Collaboration Suite Version9.0.0 Updatep5
SynacorZimbra Collaboration Suite Version9.0.0 Updatep6
SynacorZimbra Collaboration Suite Version9.0.0 Updatep7
SynacorZimbra Collaboration Suite Version9.0.0 Updatep8
SynacorZimbra Collaboration Suite Version9.0.0 Updatep9

07.10.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability

Schwachstelle

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 30.62% 0.965
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 5.4 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.