Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33372: n/a

0
Medium
VulnerabilityCVE-2026-33372cvecve-2026-33372
Published: Fri Mar 20 2026 (03/20/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A cross-site request forgery (CSRF) vulnerability exists in Zimbra Webmail due to improper validation of CSRF tokens. The application accepts CSRF tokens supplied within the request body instead of requiring them through the expected request header. An attacker can exploit this issue by tricking an authenticated user into submitting a crafted request. This may allow unauthorized actions to be performed on behalf of the victim.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:19:40 UTC

Technical Analysis

CVE-2026-33372 is a cross-site request forgery (CSRF) vulnerability identified in Zimbra Collaboration Suite (ZCS) versions 10.0 and 10.1, specifically within the Zimbra Webmail interface. The root cause is improper validation of CSRF tokens: the application accepts CSRF tokens supplied in the request body instead of enforcing their presence in the expected HTTP request header. This deviation from secure CSRF token handling allows attackers to craft malicious web requests that, when executed by an authenticated user, can perform unauthorized actions on their behalf without their consent. The vulnerability exploits the trust relationship between the user's browser and the Zimbra server, leveraging the victim's authenticated session. The CVSS 3.1 base score of 5.4 indicates a medium severity, with attack vector being network-based, low attack complexity, no privileges required, but requiring user interaction (the victim must be tricked into submitting the malicious request). The impact affects confidentiality and integrity to a limited extent, with no availability impact. No public exploits or patches are currently documented, but the vulnerability is recognized and published in the CVE database. This vulnerability falls under CWE-352, which covers CSRF issues related to insufficient validation of request authenticity tokens.

Potential Impact

The primary impact of CVE-2026-33372 is the potential for unauthorized actions to be performed within the Zimbra Webmail environment on behalf of authenticated users. This can lead to limited confidentiality breaches, such as unauthorized access or disclosure of email metadata or content if the attacker can manipulate user actions to reveal such information. Integrity may be compromised if the attacker can cause changes to user settings, send emails, or modify mailbox contents without user consent. Availability is not affected by this vulnerability. Organizations relying on Zimbra Collaboration Suite for email and collaboration services may face risks of account misuse, unauthorized data manipulation, and potential lateral movement if attackers leverage this vulnerability as part of a broader attack chain. The risk is heightened in environments where users frequently access Zimbra Webmail via browsers and may be susceptible to social engineering or phishing attacks that deliver the crafted malicious requests. Although no known exploits are reported in the wild, the vulnerability's ease of exploitation (low complexity and no privileges required) means attackers could develop exploits if motivated. This could impact organizations globally, especially those with large deployments of Zimbra Collaboration Suite versions 10.0 and 10.1.

Mitigation Recommendations

To mitigate CVE-2026-33372, organizations should first verify if they are running affected versions of Zimbra Collaboration Suite (10.0 or 10.1) and prioritize upgrading to a patched version once available. In the absence of an official patch, administrators should implement the following practical measures: 1) Enforce strict Content Security Policy (CSP) headers to restrict the domains from which scripts can be loaded, reducing the risk of malicious script execution. 2) Implement additional server-side validation to ensure CSRF tokens are only accepted via the expected HTTP headers, rejecting tokens supplied in the request body. 3) Educate users about the risks of phishing and social engineering attacks that could trick them into submitting malicious requests. 4) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests that include CSRF tokens in unexpected locations. 5) Monitor logs for unusual or unauthorized actions within Zimbra Webmail that could indicate exploitation attempts. 6) Consider deploying multi-factor authentication (MFA) to reduce the impact of session hijacking or misuse. These steps, combined with timely patching, will reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-19T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bd5895e32a4fbe5f9d8586

Added to database: 3/20/2026, 2:24:21 PM

Last enriched: 3/27/2026, 7:19:40 PM

Last updated: 5/1/2026, 7:53:03 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses