Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45510: n/a

0
Medium
VulnerabilityCVE-2024-45510cvecve-2024-45510
Published: Wed Nov 20 2024 (11/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Zimbra Collaboration (ZCS) through 10.0. Zimbra Webmail (Modern UI) is vulnerable to a stored Cross-Site Scripting (XSS) attack due to improper sanitization of user input. This allows an attacker to inject malicious code into specific fields of an e-mail message. When the victim adds the attacker to their contacts, the malicious code is stored and executed when viewing the contact list. This can lead to unauthorized actions such as arbitrary mail sending, mailbox exfiltration, profile picture alteration, and other malicious actions. Proper sanitization and escaping of input fields are necessary to mitigate this vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:15:03 UTC

Technical Analysis

CVE-2024-45510 is a stored Cross-Site Scripting (XSS) vulnerability affecting Zimbra Collaboration Suite (ZCS) Webmail Modern UI through version 10.0. The vulnerability stems from insufficient sanitization of user-supplied input in specific email message fields, which allows an attacker to embed malicious JavaScript code. When the victim adds the attacker as a contact, the malicious script is stored in the contact list and executed when the victim views it. This stored XSS can be leveraged to perform unauthorized actions such as sending arbitrary emails on behalf of the victim, exfiltrating mailbox contents, altering the victim’s profile picture, and potentially other malicious activities that compromise confidentiality and integrity of the mailbox. The attack requires the attacker to have privileges to send emails and the victim to perform the action of adding the attacker to their contacts, which involves user interaction. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 base score is 6.1, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. No public exploits or patches are currently available, emphasizing the importance of proactive mitigation. Proper input validation, sanitization, and escaping of all user-controllable fields in the webmail interface are critical to prevent exploitation.

Potential Impact

The impact of CVE-2024-45510 on organizations using Zimbra Collaboration Suite can be significant, particularly for those relying heavily on Zimbra for email communications. Successful exploitation allows attackers to execute arbitrary scripts in the context of the victim’s browser, leading to unauthorized email sending which can facilitate phishing or spam campaigns originating from trusted accounts. Mailbox exfiltration compromises sensitive corporate communications and intellectual property, while profile picture alteration can be used for social engineering or reputational damage. Although the attack requires some privileges and user interaction, the scope includes any user who can be tricked into adding a malicious contact, making it a viable vector for targeted attacks within organizations. The confidentiality and integrity of email communications are at risk, potentially leading to data breaches, compliance violations, and erosion of trust. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability’s presence in a widely used collaboration platform makes it a notable risk for enterprises, government agencies, and educational institutions worldwide.

Mitigation Recommendations

To mitigate CVE-2024-45510, organizations should implement the following specific measures beyond generic advice: 1) Immediately audit and sanitize all user input fields in the Zimbra Webmail Modern UI, especially those related to email message content and contact management, ensuring proper escaping of HTML and JavaScript characters. 2) Apply any available vendor patches or updates as soon as they are released; if patches are not yet available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection patterns targeting Zimbra interfaces. 3) Restrict the ability to add contacts or send emails to trusted users only, and monitor contact list changes for anomalous additions. 4) Educate users about the risks of adding unknown contacts and encourage verification of contact sources. 5) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the webmail environment. 6) Conduct regular security assessments and penetration tests focusing on webmail interfaces to detect similar injection flaws. 7) Monitor logs for unusual email sending patterns or access to contact lists that may indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-01T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cefb7ef31ef0b56a4ae

Added to database: 2/25/2026, 9:43:11 PM

Last enriched: 2/26/2026, 8:15:03 AM

Last updated: 4/12/2026, 9:12:54 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses