Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27915: n/a

0
Medium
VulnerabilityCVE-2025-27915cvecve-2025-27915
Published: Wed Mar 12 2025 (03/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:59:52 UTC

Technical Analysis

CVE-2025-27915 is a stored cross-site scripting (XSS) vulnerability identified in the Classic Web Client of Zimbra Collaboration Suite (ZCS) versions 9.0, 10.0, and 10.1. The root cause is insufficient sanitization of HTML content embedded within ICS calendar files attached to emails. Specifically, the vulnerability leverages the ontoggle event handler inside a <details> HTML tag, which allows embedded JavaScript code to execute when a user views the malicious email containing the crafted ICS file. This JavaScript runs within the context of the victim’s authenticated session, enabling an attacker to perform unauthorized actions such as modifying email filters to redirect incoming mail to attacker-controlled addresses. This can facilitate data exfiltration and further compromise of the victim’s email account. The vulnerability requires the victim to open or preview the malicious email, and the attacker must have at least limited privileges to send emails to the victim. The CVSS 3.1 score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges and user interaction. No public exploits are known at this time, but the vulnerability poses a significant risk due to the potential for persistent unauthorized actions within the victim’s mailbox. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). No official patches have been linked yet, so organizations should monitor vendor advisories closely.

Potential Impact

The impact of CVE-2025-27915 on organizations can be significant, especially for those relying on Zimbra Collaboration Suite for email and calendaring. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim’s session, leading to unauthorized modification of email filters. This can result in sensitive emails being redirected to attacker-controlled accounts, enabling data leakage and espionage. Additionally, attackers may manipulate mailbox settings or perform other unauthorized actions, undermining the confidentiality and integrity of email communications. Although availability is not directly affected, the compromise of email accounts can disrupt business operations and trust. Organizations with high-value targets or sensitive communications are at increased risk. The medium severity score indicates moderate risk, but the potential for persistent unauthorized access and data exfiltration elevates the threat. The lack of known exploits currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2025-27915, organizations should first monitor Zimbra’s official channels for patches and apply them promptly once available. In the absence of patches, administrators can implement several practical mitigations: 1) Disable automatic rendering or previewing of ICS attachments in the Classic Web Client to prevent automatic execution of malicious content. 2) Implement strict email filtering to block or quarantine emails containing ICS attachments from untrusted sources. 3) Educate users to avoid opening suspicious calendar invites or emails with ICS files from unknown senders. 4) Employ Content Security Policy (CSP) headers if possible to restrict JavaScript execution within the web client. 5) Review and restrict mailbox filter creation permissions to limit unauthorized changes. 6) Monitor mailbox filter configurations and logs for unusual changes indicative of exploitation attempts. 7) Consider upgrading to newer Zimbra versions or alternative clients that do not exhibit this vulnerability. These targeted steps go beyond generic advice and focus on reducing attack surface and detecting exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e490596ce96be75a027aa0

Added to database: 10/7/2025, 4:00:25 AM

Last enriched: 2/26/2026, 11:59:52 PM

Last updated: 3/25/2026, 4:19:17 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses