A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.
References
| Link | Resource |
|---|---|
| https://wiki.zimbra.com/wiki/Security_Center | Release Notes Vendor Advisory |
| https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy | Product |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-68645 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-22 18:16
Updated : 2026-01-23 18:39
NVD link : CVE-2025-68645
Mitre link : CVE-2025-68645
CVE.ORG link : CVE-2025-68645
JSON object : View
Products Affected
synacor
- zimbra_collaboration_suite
CWE
CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
