PT-2025-11082 · Zimbra · Zimbra Collaboration
Published
2025-01-27
·
Updated
2025-10-16
·
CVE-2025-27915
CVSS v2.0
5.5
5.5
Medium
Base vector | Vector | AV:N/AC:L/Au:S/C:P/I:P/A:N |
Name of the Vulnerable Software and Affected Versions
Zimbra Collaboration Suite (ZCS) versions 9.0, 10.0, and 10.1
Zimbra Collaboration Suite (ZCS) versions 9.0.0 Patch 44, 10.0.13 and 10.1.5
Description
A stored cross-site scripting (XSS) issue exists in the Classic Web Client of Zimbra Collaboration Suite (ZCS) due to insufficient sanitization of HTML content within ICS (iCalendar) files. When a user views an email containing a malicious ICS entry, the embedded JavaScript code executes through an 'ontoggle' event within a
<details>
tag. This allows an attacker to execute arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions like redirecting emails to an attacker-controlled address and data exfiltration. The vulnerability, tracked as CVE-2025-27915, was actively exploited in attacks targeting a Brazilian military organization, with attackers spoofing the Libyan Navy’s Protocol Office. The malicious ICS files contained Base64-obfuscated JavaScript code designed to steal credentials, emails, and contacts. The exploit leveraged asynchronous payloads and delayed execution to evade detection. The attack involved manipulating email filters and monitoring user activity via the Zimbra SOAP API. It is estimated that the attack could have effects comparable to remote code execution (RCE).Recommendations
Zimbra Collaboration Suite (ZCS) version 9.0.0 Patch 44 should be applied.
Zimbra Collaboration Suite (ZCS) version 10.0.13 should be applied.
Zimbra Collaboration Suite (ZCS) version 10.1.5 should be applied.
Exploit
Fix
RCE
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-12561
CVE-2025-27915
Affected Products
Zimbra Collaboration
References · 55
- 🔥 https://strikeready.com/blog/0day-ics-attack-in-the-wild · Exploit
- https://wiki.zimbra.com/wiki/Security_Center · Security Note
- https://osv.dev/vulnerability/CVE-2025-27915 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-27915 · Security Note
- https://bdu.fstec.ru/vul/2025-12561 · Security Note
- https://github.com/StrikeReady-Inc/research⭐ 9 · Note
- https://reddit.com/r/pwnhub/comments/1o34lp6/cybersecurity_update_gladinet_flaw_university · Reddit Post
- https://twitter.com/EUNOMATIX1/status/1975254345844465880 · Twitter Post
- https://twitter.com/autumn_good_35/status/1975199843938455685 · Twitter Post
- https://twitter.com/y_cybersecurity/status/1975184979291222369 · Twitter Post
- https://t.me/thehackernews/7662 · Telegram Post
- https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.5#Security_Fixes · Note
- https://twitter.com/TweetThreatNews/status/1975170175151358287 · Twitter Post
- https://t.me/CyberSecurityTechnologies/12428 · Telegram Post
- https://twitter.com/zeeshankghouri/status/1975090404623356279 · Twitter Post