An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
References
| Link | Resource |
|---|---|
| https://wiki.zimbra.com/wiki/Security_Center | Release Notes |
| https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.13#Security_Fixes | Release Notes |
| https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.5#Security_Fixes | Release Notes |
| https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P44#Security_Fixes | Release Notes |
| https://strikeready.com/blog/0day-ics-attack-in-the-wild/ | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27915 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-12 15:15
Updated : 2025-11-04 16:45
NVD link : CVE-2025-27915
Mitre link : CVE-2025-27915
CVE.ORG link : CVE-2025-27915
JSON object : View
Products Affected
synacor
- zimbra_collaboration_suite
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
