Zimbra Collaboration
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Zimbra Collaboration.
Known Exploited Zimbra Collaboration Vulnerabilities
The following Zimbra Collaboration vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability |
Zimbra Collaboration (ZCS) contains flaw in the mboximport functionality, allowing an authenticated attacker to upload arbitrary files to perform remote code execution. This vulnerability was chained with CVE-2022-37042 which allows for unauthenticated remote code execution. CVE-2022-27925 Exploit Probability: 94.3% |
August 11, 2022 |
| Zimbra Collaboration (ZCS) Authentication Bypass Vulnerability |
Zimbra Collaboration (ZCS) contains an authentication bypass vulnerability in MailboxImportServlet. This vulnerability was chained with CVE-2022-27925 which allows for unauthenticated remote code execution. CVE-2022-37042 Exploit Probability: 94.3% |
August 11, 2022 |
| Zimbra Collaboration (ZCS) Command Injection Vulnerability |
Zimbra Collaboration (ZCS) allows an attacker to inject memcache commands into a targeted instance which causes an overwrite of arbitrary cached entries. CVE-2022-27924 Exploit Probability: 90.4% |
August 4, 2022 |
Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 1 vulnerability in Zimbra Collaboration with an average score of 7.2 out of ten. Last year, in 2025 Collaboration had 5 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Collaboration in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 1.63.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 7.20 |
| 2025 | 5 | 5.57 |
| 2024 | 12 | 6.83 |
| 2023 | 12 | 7.44 |
| 2022 | 17 | 7.22 |
| 2021 | 4 | 6.85 |
| 2020 | 1 | 6.50 |
It may take a day or so for new Collaboration vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Zimbra Collaboration Security Vulnerabilities
Zimbra ZCS 10 <10.0.18 / 10.1 <10.1.13 Classic UI XSS via CSS @import
CVE-2025-66376
7.2 - High
- January 05, 2026
Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Classic UI stored XSS via Cascading Style Sheets (CSS) @import directives in an HTML e-mail message.
XSS
Zimbra Chat Proxy SSRF in ZCS <10.1.12
CVE-2025-62763
5 - Medium
- October 21, 2025
Zimbra Collaboration (ZCS) before 10.1.12 allows SSRF because of the configuration of the chat proxy.
SSRF
CSRF in Zimbra ResetPasswordRequest Enables Unauthorized Password Reset
CVE-2025-54390
6.3 - Medium
- September 17, 2025
A Cross-Site Request Forgery (CSRF) vulnerability exists in the ResetPasswordRequest operation of Zimbra Collaboration (ZCS) when the zimbraFeatureResetPasswordStatus attribute is enabled. An attacker can exploit this by tricking an authenticated user into visiting a malicious webpage that silently sends a crafted SOAP request to reset the user's password. The vulnerability stems from a lack of CSRF token validation on the endpoint, allowing password resets without the user's consent.
Session Riding
XSS in Zimbra Collaboration before 10.1; briefcase import metadata
CVE-2024-45515
- July 30, 2025
An issue was discovered in Zimbra Collaboration (ZCS) through 10.1. A Cross-Site Scripting (XSS) vulnerability exists in Zimbra webmail due to insufficient validation of the content type metadata when importing files into the briefcase. Attackers can exploit this issue by crafting a file with manipulated metadata, allowing them to bypass content type checks and execute arbitrary JavaScript within the victim's session.
XSS in Zimbra 9.0-10.1 /h/rest endpoint
CVE-2025-27914
- March 12, 2025
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A Reflected Cross-Site Scripting (XSS) vulnerability exists in the /h/rest endpoint, allowing authenticated attackers to inject and execute arbitrary JavaScript in a victim's session. Exploitation requires a valid auth token and involves a crafted URL with manipulated query parameters that triggers XSS when accessed by a victim.
Stored XSS in Zimbra CWS v9.0-10.1 via Unsanitized iCal
CVE-2025-27915
5.4 - Medium
- March 12, 2025
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
XSS
SSRF RCE in Zimbra Collaboration 10.1.x (before 10.1.1)
CVE-2024-45518
8.8 - High
- October 22, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE).
SSRF
Zimbra PostJournal unauth exec before 10.1.1
CVE-2024-45519
10 - Critical
- October 02, 2024
The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.
Shell injection
Zimbra C&S 9.0/10.0 XSS via res param (JS injection)
CVE-2024-33536
5.4 - Medium
- August 12, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability occurs due to inadequate input validation of the res parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file, accessible externally, and crafting a URL containing its location in the res parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.
XSS
Zimbra C-10 LFI via packages param in ZCS 9.0/10.0
CVE-2024-33535
7.5 - High
- August 12, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability involves unauthenticated local file inclusion (LFI) in a web application, specifically impacting the handling of the packages parameter. Attackers can exploit this flaw to include arbitrary local files without authentication, potentially leading to unauthorized access to sensitive information. The vulnerability is limited to files within a specific directory.
Directory traversal
Zimbra Collab Suite 9.0/10.0 Reflected XSS via packages param
CVE-2024-33533
5.4 - Medium
- August 12, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0, issue 1 of 2. A reflected cross-site scripting (XSS) vulnerability has been identified in the Zimbra webmail admin interface. This vulnerability occurs due to inadequate input validation of the packages parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file and crafting a URL containing its location in the packages parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.
XSS
Zimbra XSS in CalendarInvite Header (v9.010.0)
CVE-2024-27443
6.1 - Medium
- August 12, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code.
XSS
Zimbra C2 LPE via zmmailboxdmgr (9.0/10.0) arg mishandling
CVE-2024-27442
7.8 - High
- August 12, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The zmmailboxdmgr binary, a component of ZCS, is intended to be executed by the zimbra user with root privileges for specific mailbox operations. However, an attacker can escalate privileges from the zimbra user to root, because of improper handling of input arguments. An attacker can execute arbitrary commands with elevated privileges, leading to local privilege escalation.
Improper Handling of Exceptional Conditions
DOM-based JS Injection in Zimbra Collaboration <9.0.0 Kepler Patch38
CVE-2023-50808
6.1 - Medium
- February 13, 2024
Zimbra Collaboration before Kepler 9.0.0 Patch 38 GA allows DOM-based JavaScript injection in the Modern UI.
XSS
Zimbra XSS via maillink causing session theft (ZCS 8.8.15/9.0/10.0)
CVE-2023-48432
6.1 - Medium
- February 13, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. XSS, with resultant session stealing, can occur via JavaScript code in a link (for a webmail redirection endpoint) within en email message, e.g., if a victim clicks on that link within Zimbra webmail.
XSS
Zimbra C 8.8.15/9.0/10.x XSS thru PDF preview JS
CVE-2023-45207
6.1 - Medium
- February 13, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. An attacker can send a PDF document through mail that contains malicious JavaScript. While previewing this file in webmail in the Chrome browser, the stored XSS payload is executed. (This has been mitigated by sanitising the JavaScript code present in a PDF document.)
XSS
Zimbra Collaboration XSS via help endpoint (8.8.15-10.0)
CVE-2023-45206
6.1 - Medium
- February 13, 2024
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. Through the help document endpoint in webmail, an attacker can inject JavaScript or HTML code that leads to cross-site scripting (XSS). (Adding an adequate message to avoid malicious code will mitigate this issue.)
XSS
Zimbra Collaboration Server 8.8.15/9.0 Account Closure Bypass via IMAP/SMTP
CVE-2023-26562
6.5 - Medium
- February 13, 2024
In Zimbra Collaboration (ZCS) 8.8.15 and 9.0, a closed account (with 2FA and generated passwords) can send e-mail messages when configured for Imap/smtp.
AuthZ
ZCS <10.0.4 XSS allows authenticated mailbox access
CVE-2023-43102
6.1 - Medium
- December 07, 2023
An issue was discovered in Zimbra Collaboration (ZCS) before 10.0.4. An XSS issue can be exploited to access the mailbox of an authenticated user. This is also fixed in 8.8.15 Patch 43 and 9.0.0 Patch 36.
XSS
XSS via unsanitized param in Zimbra ZCS before 10.0.4 (8.8.15/9.0.0 fixes)
CVE-2023-43103
6.1 - Medium
- December 07, 2023
An XSS issue was discovered in a web endpoint in Zimbra Collaboration (ZCS) before 10.0.4 via an unsanitized parameter. This is also fixed in 8.8.15 Patch 43 and 9.0.0 Patch 36.
XSS
Zimbra Collaboration Server <10.0.3 Account Credential Disclosure
CVE-2023-41106
7.5 - High
- December 07, 2023
An issue was discovered in Zimbra Collaboration (ZCS) before 10.0.3. An attacker can gain access to a Zimbra account. This is also fixed in 9.0.0 Patch 35 and 8.8.15 Patch 42.
Zimbra Collaboration Server 8.8.15 Privilege Escalation via Pwd & 2FA
CVE-2023-29381
9.8 - Critical
- July 06, 2023
An issue in Zimbra Collaboration (ZCS) v.8.8.15 and v.9.0 allows a remote attacker to escalate privileges and obtain sensitive information via the password and 2FA parameters.
Zimbra Collaboration Suite v8.8.15/v9.0 sfdc_preauth.jsp Remote Code Exec
CVE-2023-29382
9.8 - Critical
- July 06, 2023
An issue in Zimbra Collaboration ZCS v.8.8.15 and v.9.0 allows an attacker to execute arbitrary code via the sfdc_preauth.jsp component.
XSS in Zimbra ZCS 8.8.15 /h/autoSaveDraft Allows Remote Auth'd Attacker
CVE-2023-34192
9 - Critical
- July 06, 2023
Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.
XSS
Zimbra ZCS 8.8.15 File Upload Vulnerability in ClientUploader - RCE
CVE-2023-34193
8.8 - High
- July 06, 2023
File Upload vulnerability in Zimbra ZCS 8.8.15 allows an authenticated privileged user to execute arbitrary code and obtain sensitive information via the ClientUploader function.
Unrestricted File Upload
Zimbra CS 9.0/8.8.15 Open Redirect via /preauth
CVE-2023-24030
6.1 - Medium
- June 15, 2023
An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0 and 8.8.15. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL if url sanitisation is bypassed in incoming requests. NOTE: this is similar, but not identical, to CVE-2021-34807.
Open Redirect
Zimbra ZCS 9.0/8.8.15 XSS via /h/ Attr
CVE-2023-24031
6.1 - Medium
- June 15, 2023
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 8.8.15. XSS can occur, via one of attributes of the webmail /h/ endpoint, to execute arbitrary JavaScript code, leading to information disclosure.
XSS
Zimbra 9.0/8.8.15 JVM Arg LPE (Priv Esc)
CVE-2023-24032
7.8 - High
- June 15, 2023
In Zimbra Collaboration Suite through 9.0 and 8.8.15, an attacker (who has initial user access to a Zimbra server instance) can execute commands as root by passing one of JVM arguments, leading to local privilege escalation (LPE).
Command Injection
Zimbra Collaboration 9.0 Classic UI XSS via Username Field
CVE-2022-45911
6.1 - Medium
- January 06, 2023
An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur on the Classic UI login page by injecting arbitrary JavaScript code in the username field. This occurs before the user logs into the system, which means that even if the attacker executes arbitrary JavaScript, they will not get any sensitive information.
XSS
XSS via URL Attributes in Zimbra ZCS 9.0 Webmail
CVE-2022-45913
6.1 - Medium
- January 06, 2023
An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur via one of attributes in webmail URLs to execute arbitrary JavaScript code, leading to information disclosure.
XSS
ZCS 8.8.15/9.0 RCE via ClientUploader Auth Admin
CVE-2022-45912
7.2 - High
- December 05, 2022
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. Remote code execution can occur through ClientUploader by an authenticated admin user. An authenticated admin user can upload files through the ClientUploader utility, and traverse to any other directory for remote code execution.
Unrestricted File Upload
ZCS 8.8.15 RefXSS via /h/search?phone in voicemail module
CVE-2022-41350
6.1 - Medium
- October 12, 2022
In Zimbra Collaboration Suite (ZCS) 8.8.15, /h/search?action=voicemail&action=listen accepts a phone parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine.
XSS
XSS via view param in Zimbra Collaboration Suite 8.8.15 (calendar)
CVE-2022-41351
6.1 - Medium
- October 12, 2022
In Zimbra Collaboration Suite (ZCS) 8.8.15, at the URL /h/calendar, one can trigger XSS by adding JavaScript code to the view parameter and changing the value of the uncheck parameter to a string (instead of default value of 10).
XSS
Zimbra ZCS 9.0 XSS via IMG onerror Info Disclosure
CVE-2022-41348
6.1 - Medium
- October 12, 2022
An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur via the onerror attribute of an IMG element, leading to information disclosure.
XSS
Reflected XSS via /h/compose attachUrl in Zimbra 8.8.15
CVE-2022-41349
6.1 - Medium
- October 12, 2022
In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/compose accepts an attachUrl parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine.
XSS
Zimbra (ZCS) 8.8.15/9.0 File Upload via amavis Cpio Loophole
CVE-2022-41352
9.8 - Critical
- September 26, 2022
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
Directory traversal
Zimbra Collaboration 8.8.x/9.x: sudo allows zimbra to run NGINX as root
CVE-2022-41347
7.8 - High
- September 26, 2022
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.
Zimbra zmslapd root exec via sudo config privilege escalation
CVE-2022-37393
7.8 - High
- August 16, 2022
Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.
X-Forwarded-Host Overrides Host in ZCS 8.8.15/9.0 ProxyServlet - Host Hijack
CVE-2022-37041
7.5 - High
- August 12, 2022
An issue was discovered in ProxyServlet.java in the /proxy servlet in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. The value of the X-Forwarded-Host header overwrites the value of the Host header in proxied requests. The value of X-Forwarded-Host header is not checked against the whitelist of hosts that ZCS is allowed to proxy to (the zimbraProxyAllowedDomains setting).
SSRF
Zimbra 8.8.15 Reflected XSS via /h/search?onload param
CVE-2022-37044
6.1 - Medium
- August 12, 2022
In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/search?action accepts parameters called extra, title, and onload that are partially sanitised and lead to reflected XSS that allows executing arbitrary JavaScript on the victim's machine.
XSS
Zimbra Collab Suite 8.8.15/9.0 CSRF Bypass in Webmail POST
CVE-2022-37043
5.7 - Medium
- August 12, 2022
An issue was discovered in the webmail component in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. When using preauth, CSRF tokens are not checked on some POST endpoints. Thus, when an authenticated user views an attacker-controlled page, a request will be sent to the application that appears to be intended. The CSRF token is omitted from the request, but the request still succeeds.
Session Riding
Zimbra C7 RCE via mboximport Zip Extraction Auth Bypass (pre-8.8.15/9.0)
CVE-2022-37042
9.8 - Critical
- August 12, 2022
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
Directory traversal
Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command)
CVE-2022-32294
9.8 - Critical
- July 11, 2022
Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced.
AuthZ
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0
CVE-2022-27924
7.5 - High
- April 21, 2022
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 allows an unauthenticated attacker to inject arbitrary memcache commands into a targeted instance. These memcache commands becomes unescaped, causing an overwrite of arbitrary cached entries.
Injection
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it
CVE-2022-27925
7.2 - High
- April 21, 2022
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal.
Directory traversal
A reflected cross-site scripting (XSS) vulnerability in the /public/launchNewWindow.jsp component of Zimbra Collaboration (aka ZCS) 9.0
CVE-2022-27926
6.1 - Medium
- April 21, 2022
A reflected cross-site scripting (XSS) vulnerability in the /public/launchNewWindow.jsp component of Zimbra Collaboration (aka ZCS) 9.0 allows unauthenticated attackers to execute arbitrary web script or HTML via request parameters.
XSS
An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1)
CVE-2022-24682
6.1 - Medium
- February 09, 2022
An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.
Output Sanitization
An issue was discovered in Zimbra Collaboration Suite 8.8 before 8.8.15 Patch 23 and 9.0 before 9.0.0 Patch 16
CVE-2021-35207
6.1 - Medium
- July 02, 2021
An issue was discovered in Zimbra Collaboration Suite 8.8 before 8.8.15 Patch 23 and 9.0 before 9.0.0 Patch 16. An XSS vulnerability exists in the login component of Zimbra Web Client, in which an attacker can execute arbitrary JavaScript by adding executable JavaScript to the loginErrorCode parameter of the login url.
XSS
An issue was discovered in ZmMailMsgView.js in the Calendar Invite component in Zimbra Collaboration Suite 8.8.x before 8.8.15 Patch 23
CVE-2021-35208
5.4 - Medium
- July 02, 2021
An issue was discovered in ZmMailMsgView.js in the Calendar Invite component in Zimbra Collaboration Suite 8.8.x before 8.8.15 Patch 23. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.
XSS
An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0
CVE-2021-34807
6.1 - Medium
- July 02, 2021
An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL via isredirect=1&redirectURL= in conjunction with the token data (e.g., a valid authtoken= value).
Open Redirect
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Zimbra Collaboration or by Zimbra? Click the Watch button to subscribe.