PT-2025-11082 · Zimbra · Zimbra Collaboration
Published
2025-01-27
·
Updated
2025-11-13
·
CVE-2025-27915
CVSS v2.0
5.5
5.5
Medium
| Base vector | Vector | AV:N/AC:L/Au:S/C:P/I:P/A:N |
Name of the Vulnerable Software and Affected Versions
Zimbra Collaboration Suite (ZCS) versions 9.0, 10.0, and 10.1
Zimbra Collaboration Suite versions 9.0.0 Patch 44, 10.0.13, and 10.1.5 and earlier
Description
Zimbra Collaboration Suite (ZCS) contains a stored cross-site scripting (XSS) flaw in the Classic Web Client. This issue stems from insufficient sanitization of HTML content within iCalendar (.ICS) files. An unauthenticated attacker can exploit this by sending a specially crafted email containing a malicious ICS file. When a user views the email, the embedded JavaScript code executes through an 'ontoggle' event within a
<details> tag, enabling the attacker to run arbitrary JavaScript within the victim's session. This allows for unauthorized actions, including redirecting emails to attacker-controlled addresses and exfiltrating data. The vulnerability was actively exploited in attacks targeting the Brazilian military in January 2025, prior to the release of patches. Attackers spoofed the Libyan Navy’s Office of Protocol to deliver the malicious ICS files. The exploit involved JavaScript code designed to steal credentials, emails, contacts, and shared folders, and to add malicious email filters. The code was obfuscated using Base64 encoding and designed to remain undetected for a period of time. The estimated impact includes potential data theft and system manipulation comparable to remote code execution (RCE).Recommendations
Zimbra Collaboration Suite versions 9.0, 10.0, and 10.1: Update to version 9.0.0 Patch 44, 10.0.13, or 10.1.5 or later.
Zimbra Collaboration Suite versions prior to 9.0.0 Patch 44, 10.0.13, and 10.1.5: Update to version 9.0.0 Patch 44, 10.0.13, or 10.1.5 or later.
Exploit
Fix
RCE
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-12561
CVE-2025-27915
Affected Products
Zimbra Collaboration
References · 60
- 🔥 https://strikeready.com/blog/0day-ics-attack-in-the-wild · Exploit
- https://bdu.fstec.ru/vul/2025-12561 · Security Note
- https://osv.dev/vulnerability/CVE-2025-27915 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-27915 · Security Note
- https://wiki.zimbra.com/wiki/Security_Center · Security Note
- https://github.com/StrikeReady-Inc/research⭐ 9 · Note
- https://twitter.com/CTIAcademy/status/1975127942796566562 · Twitter Post
- https://t.me/avleonovcom/1598 · Telegram Post
- https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P44#Security_Fixes · Note
- https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.13#Security_Fixes · Note
- https://twitter.com/ScyScan/status/1975637526502359386 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1o34lp6/cybersecurity_update_gladinet_flaw_university · Reddit Post
- https://t.me/CyberSecurityTechnologies/12428 · Telegram Post
- https://twitter.com/fernandokarl/status/1975841739458982158 · Twitter Post
- https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.5#Security_Fixes · Note