Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27915: n/a

0
Medium
VulnerabilityCVE-2025-27915cvecve-2025-27915
Published: Wed Mar 12 2025 (03/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:12:55 UTC

Technical Analysis

CVE-2025-27915 is a stored cross-site scripting (XSS) vulnerability identified in the Classic Web Client of Zimbra Collaboration Suite (ZCS) versions 9.0, 10.0, and 10.1. The root cause is insufficient sanitization of HTML content embedded within ICS calendar files attached to emails. Specifically, the vulnerability exploits the ontoggle event handler inside a <details> HTML tag, which allows embedded JavaScript to execute when a user views a maliciously crafted email containing a malicious ICS entry. This JavaScript runs within the context of the victim's authenticated session, enabling attackers to perform unauthorized actions such as modifying email filters to redirect incoming messages to attacker-controlled addresses. Such actions can facilitate data exfiltration, interception of sensitive communications, and further compromise of the victim's account. The vulnerability requires the victim to open or preview the malicious email, implying user interaction is necessary. The CVSS 3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. No patches or exploits are currently publicly available, but the vulnerability is publicly disclosed and should be addressed promptly. The CWE classification is CWE-79, indicating cross-site scripting. The scope is limited to the Classic Web Client interface of Zimbra Collaboration, a widely used enterprise email and collaboration platform.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of email communications. Successful exploitation can lead to unauthorized email redirection, allowing attackers to intercept sensitive information, conduct phishing campaigns, or exfiltrate data. This is particularly critical for sectors handling sensitive data such as finance, government, healthcare, and critical infrastructure. The ability to manipulate email filters can facilitate persistent access and stealthy data theft. Additionally, compromised accounts can be leveraged for lateral movement within networks, increasing the overall risk posture. Given the widespread use of Zimbra in European enterprises and public institutions, the vulnerability could impact a large number of users if exploited. Although exploitation requires user interaction and authenticated access, the medium severity rating reflects the potential for significant damage if these conditions are met. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.

Mitigation Recommendations

Organizations should immediately assess their Zimbra Collaboration Suite deployments to identify affected versions (9.0, 10.0, 10.1 Classic Web Client). Although no official patches are currently listed, monitoring vendor advisories for updates is critical. In the interim, implement strict email filtering to block or quarantine emails containing ICS attachments from untrusted sources. Disable automatic preview of emails or ICS attachments in the Classic Web Client to reduce the risk of inadvertent execution. Educate users about the risks of opening unexpected calendar invites or attachments, emphasizing caution with ICS files. Review and restrict permissions to limit the ability of compromised accounts to modify email filters or forwarding rules. Employ web application firewalls (WAFs) with rules targeting XSS patterns in HTTP requests to the Zimbra web interface. Conduct regular audits of email filter configurations to detect unauthorized changes. Finally, consider upgrading to newer Zimbra versions or alternative collaboration platforms if patches are delayed or unavailable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e490596ce96be75a027aa0

Added to database: 10/7/2025, 4:00:25 AM

Last enriched: 10/21/2025, 8:12:55 PM

Last updated: 11/20/2025, 7:15:35 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats