Zimbra Collaboration Suite Zimbra Collaboration Suite

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Zimbra Collaboration Suite.

By the Year

In 2026 there have been 0 vulnerabilities in Zimbra Collaboration Suite. Last year, in 2025 Zimbra Collaboration Suite had 4 security vulnerabilities published. Right now, Zimbra Collaboration Suite is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 4 6.90
2024 8 7.00
2023 5 6.72
2022 7 7.54
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 3 0.00

It may take a day or so for new Zimbra Collaboration Suite vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Zimbra Collaboration Suite Security Vulnerabilities

Zimbra 10.0/10.1: Hardcoded Flickr API Creds Exposure
CVE-2025-67809 4.7 - Medium - December 15, 2025

An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A hardcoded Flickr API key and secret are present in the publicly accessible Flickr Zimlet used by Zimbra Collaboration. Because these credentials are embedded directly in the Zimlet, any unauthorized party could retrieve them and misuse the Flickr integration. An attacker with access to the exposed credentials could impersonate the legitimate application and initiate valid Flickr OAuth flows. If a user is tricked into approving such a request, the attacker could gain access to the user s Flickr data. The hardcoded credentials have since been removed from the Zimlet code, and the associated key has been revoked.

Use of Hard-coded Credentials

CVE-2025-54391: Zimbra Collaboration 2FA Bypass via EnableTwoFactorAuthRequest SOAP
CVE-2025-54391 9.1 - Critical - September 16, 2025

A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zimbra Collaboration (ZCS) allows an attacker with valid user credentials to bypass Two-Factor Authentication (2FA) protection. The attacker can configure an additional 2FA method (either a third-party authenticator app or email-based 2FA) without presenting a valid authentication token or proving access to an already configured 2FA method. This bypasses 2FA and results in unauthorized access to accounts that are otherwise protected by 2FA.

Authorization

Zimbra CS pre-10.1.9 DoS via Excessive Path Segments
CVE-2025-53645 - July 09, 2025

Zimbra Collaboration (ZCS) before 9.0.0 Patch 46, 10.0.x before 10.0.15, and 10.1.x before 10.1.9 is vulnerable to a denial of service condition due to improper handling of excessive, comma-separated path segments in the Admin Console. An unauthenticated remote attacker can send specially crafted GET requests that trigger redundant processing and inflated responses. This leads to uncontrolled resource consumption, resulting in denial of service.

Zimbra Classic UI XSS via <img> tags (before Patch 43, 10.1.4)
CVE-2024-45516 - May 14, 2025

An issue was discovered in Zimbra Collaboration (ZCS) 9.0.0 before Patch 43, 10.0.x before 10.0.12, 10.1.x before 10.1.4, and 8.8.15 before Patch 47. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, including malformed <img> tags with embedded JavaScript. The vulnerability is triggered when a user views a specially crafted email in the Classic UI, requiring no additional user interaction.

Zimbra GraphQL CSRF Info Disclosure via Malicious Email
CVE-2024-9665 6.5 - Medium - November 22, 2024

Zimbra GraphQL Cross-Site Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Zimbra. User interaction is required to exploit this vulnerability in that the target must open a malicious email message. The specific flaw exists within the implementation of the graphql endpoint. The issue results from the lack of proper protections against cross-site request forgery (CSRF) attacks. An attacker can leverage this vulnerability to disclose information in the context of the target email account. Was ZDI-CAN-23939.

Session Riding

Zimbra 9.0/10.0 Webmail XSS via Admin Panel
CVE-2024-45194 - November 21, 2024

In Zimbra Collaboration (ZCS) 9.0 and 10.0, a vulnerability in the Webmail Modern UI allows execution of stored Cross-Site Scripting (XSS) payloads. An attacker with administrative access to the Zimbra Administration Panel can inject malicious JavaScript code while configuring an email account. This injected code is stored on the server and executed in the context of the victim's browser when interacting with specific elements in the web interface. (The vulnerability can be mitigated by properly sanitizing input parameters to prevent the injection of malicious code.)

SSRF RCE in Zimbra Collaboration 10.1.x (before 10.1.1)
CVE-2024-45518 8.8 - High - October 22, 2024

An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE).

SSRF

Zimbra PostJournal unauth exec before 10.1.1
CVE-2024-45519 10 - Critical - October 02, 2024

The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.

Shell injection

Zimbra Collab Suite 9.0/10.0 Reflected XSS via packages param
CVE-2024-33533 5.4 - Medium - August 12, 2024

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0, issue 1 of 2. A reflected cross-site scripting (XSS) vulnerability has been identified in the Zimbra webmail admin interface. This vulnerability occurs due to inadequate input validation of the packages parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file and crafting a URL containing its location in the packages parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.

XSS

DOM-based JS Injection in Zimbra Collaboration <9.0.0 Kepler Patch38
CVE-2023-50808 6.1 - Medium - February 13, 2024

Zimbra Collaboration before Kepler 9.0.0 Patch 38 GA allows DOM-based JavaScript injection in the Modern UI.

XSS

Zimbra XSS via maillink causing session theft (ZCS 8.8.15/9.0/10.0)
CVE-2023-48432 6.1 - Medium - February 13, 2024

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. XSS, with resultant session stealing, can occur via JavaScript code in a link (for a webmail redirection endpoint) within en email message, e.g., if a victim clicks on that link within Zimbra webmail.

XSS

Zimbra C 8.8.15/9.0/10.x XSS thru PDF preview JS
CVE-2023-45207 6.1 - Medium - February 13, 2024

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. An attacker can send a PDF document through mail that contains malicious JavaScript. While previewing this file in webmail in the Chrome browser, the stored XSS payload is executed. (This has been mitigated by sanitising the JavaScript code present in a PDF document.)

XSS

Zimbra CWS / v8-10 JSP/XML Exposure (before 8.8.15p41/9.0.0p34/10.0.2)
CVE-2023-38750 7.5 - High - July 31, 2023

In Zimbra Collaboration (ZCS) 8 before 8.8.15 Patch 41, 9 before 9.0.0 Patch 34, and 10 before 10.0.2, internal JSP and XML files can be exposed.

Zimbra 9.0/8.8.15 JVM Arg LPE (Priv Esc)
CVE-2023-24032 7.8 - High - June 15, 2023

In Zimbra Collaboration Suite through 9.0 and 8.8.15, an attacker (who has initial user access to a Zimbra server instance) can execute commands as root by passing one of JVM arguments, leading to local privilege escalation (LPE).

Command Injection

Zimbra CS 9.0/8.8.15 Open Redirect via /preauth
CVE-2023-24030 6.1 - Medium - June 15, 2023

An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0 and 8.8.15. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL if url sanitisation is bypassed in incoming requests. NOTE: this is similar, but not identical, to CVE-2021-34807.

Open Redirect

XSS via URL Attributes in Zimbra ZCS 9.0 Webmail
CVE-2022-45913 6.1 - Medium - January 06, 2023

An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur via one of attributes in webmail URLs to execute arbitrary JavaScript code, leading to information disclosure.

XSS

Zimbra Collaboration 9.0 Classic UI XSS via Username Field
CVE-2022-45911 6.1 - Medium - January 06, 2023

An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur on the Classic UI login page by injecting arbitrary JavaScript code in the username field. This occurs before the user logs into the system, which means that even if the attacker executes arbitrary JavaScript, they will not get any sensitive information.

XSS

XSS via view param in Zimbra Collaboration Suite 8.8.15 (calendar)
CVE-2022-41351 6.1 - Medium - October 12, 2022

In Zimbra Collaboration Suite (ZCS) 8.8.15, at the URL /h/calendar, one can trigger XSS by adding JavaScript code to the view parameter and changing the value of the uncheck parameter to a string (instead of default value of 10).

XSS

Zimbra (ZCS) 8.8.15/9.0 File Upload via amavis Cpio Loophole
CVE-2022-41352 9.8 - Critical - September 26, 2022

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.

Directory traversal

Zimbra zmslapd root exec via sudo config privilege escalation
CVE-2022-37393 7.8 - High - August 16, 2022

Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.

Zimbra Collab Suite 8.8.15/9.0 CSRF Bypass in Webmail POST
CVE-2022-37043 5.7 - Medium - August 12, 2022

An issue was discovered in the webmail component in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. When using preauth, CSRF tokens are not checked on some POST endpoints. Thus, when an authenticated user views an attacker-controlled page, a request will be sent to the application that appears to be intended. The CSRF token is omitted from the request, but the request still succeeds.

Session Riding

Zimbra C7 RCE via mboximport Zip Extraction Auth Bypass (pre-8.8.15/9.0)
CVE-2022-37042 9.8 - Critical - August 12, 2022

Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.

Directory traversal

X-Forwarded-Host Overrides Host in ZCS 8.8.15/9.0 ProxyServlet - Host Hijack
CVE-2022-37041 7.5 - High - August 12, 2022

An issue was discovered in ProxyServlet.java in the /proxy servlet in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. The value of the X-Forwarded-Host header overwrites the value of the Host header in proxied requests. The value of X-Forwarded-Host header is not checked against the whitelist of hosts that ZCS is allowed to proxy to (the zimbraProxyAllowedDomains setting).

SSRF

Zimbra 8.8.15 Reflected XSS via /h/search?onload param
CVE-2022-37044 6.1 - Medium - August 12, 2022

In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/search?action accepts parameters called extra, title, and onload that are partially sanitised and lead to reflected XSS that allows executing arbitrary JavaScript on the victim's machine.

XSS

Zimbra Web Client (ZWC) in Zimbra Collaboration Suite 8.8 before 8.8.8.Patch4 and 8.7 before 8.7.11.Patch4 has Persistent XSS
CVE-2018-10939 - May 30, 2018

Zimbra Web Client (ZWC) in Zimbra Collaboration Suite 8.8 before 8.8.8.Patch4 and 8.7 before 8.7.11.Patch4 has Persistent XSS via a contact group.

Cross-site request forgery (CSRF) vulnerability in the login form in Zimbra Collaboration Suite (aka ZCS) before 8.6.0 Patch 10, 8.7.x before 8.7.11 Patch 2, and 8.8.x before 8.8.8 Patch 1
CVE-2015-7610 - May 30, 2018

Cross-site request forgery (CSRF) vulnerability in the login form in Zimbra Collaboration Suite (aka ZCS) before 8.6.0 Patch 10, 8.7.x before 8.7.11 Patch 2, and 8.8.x before 8.8.8 Patch 1 allows remote attackers to hijack the authentication of unspecified victims by leveraging failure to use a CSRF token.

mailboxd in Zimbra Collaboration Suite 8.8 before 8.8.8; 8.7 before 8.7.11.Patch3; and 8.6 before 8.6.0.Patch10
CVE-2018-10951 - May 10, 2018

mailboxd in Zimbra Collaboration Suite 8.8 before 8.8.8; 8.7 before 8.7.11.Patch3; and 8.6 before 8.6.0.Patch10 allows zimbraSSLPrivateKey read access via a GetServer, GetAllServers, or GetAllActiveServers call in the Admin SOAP API.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Zimbra Collaboration Suite or by Zimbra? Click the Watch button to subscribe.

Zimbra
Vendor

subscribe