CVE-2025-48700

Analyzed
Published: 23 Jun 2025, 00:00
Last modified:21 Apr 2026, 03:55

Vulnerability Summary

Overall Risk (default)
medium
27/100
CVSS Score
6.1 MEDIUM
v3.1 (cve.org)
EPSS Score
15.01% MEDIUM
15% probability +14.99%
KEV
Listed
CISA
1 listing
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

23 Jun 2025, 00:00
Published
Vulnerability first disclosed
20 Apr 2026, 00:00
Added to CISA KEV
Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
21 Apr 2026, 03:55
Last Modified
Vulnerability information updated
23 Apr 2026, 00:00
CISA Remediation Due
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Description

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 and 10.1. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, specifically involving crafted tag structures and attribute values that include an @import directive and other script injection vectors. The vulnerability is triggered when a user views a crafted e-mail message in the Classic UI, requiring no additional user interaction.

CVSS Metrics

  • v3.1MEDIUMScore: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS Trends

Current EPSS score: 15.01% Percentile: 95%

Techniques & Countermeasures

  • CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

    The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Affected Systems

  • UnknownZimbra Collaboration Suite

    ≥ 10.0.0, < 10.0.12 | ≥ 10.1.0, < 10.1.4 | 8.8.15 | 8.8.15:p1 | 8.8.15:p10 | 8.8.15:p11 | 8.8.15:p12 | 8.8.15:p13 | 8.8.15:p14 | 8.8.15:p15 | 8.8.15:p16 | 8.8.15:p17 | 8.8.15:p18 | 8.8.15:p19 | 8.8.15:p2 | 8.8.15:p20 | 8.8.15:p21 | 8.8.15:p22 | 8.8.15:p23 | 8.8.15:p24 | 8.8.15:p25 | 8.8.15:p26 | 8.8.15:p27 | 8.8.15:p28 | 8.8.15:p29 | 8.8.15:p3 | 8.8.15:p30 | 8.8.15:p31 | 8.8.15:p31.1 | 8.8.15:p32 | 8.8.15:p33 | 8.8.15:p34 | 8.8.15:p35 | 8.8.15:p36 | 8.8.15:p37 | 8.8.15:p38 | 8.8.15:p39 | 8.8.15:p4 | 8.8.15:p40 | 8.8.15:p41 | 8.8.15:p42 | 8.8.15:p43 | 8.8.15:p44 | 8.8.15:p45 | 8.8.15:p46 | 8.8.15:p5 | 8.8.15:p6 | 8.8.15:p7 | 8.8.15:p8 | 8.8.15:p9 | 9.0.0 | 9.0.0:p1 | 9.0.0:p10 | 9.0.0:p11 | 9.0.0:p12 | 9.0.0:p13 | 9.0.0:p14 | 9.0.0:p15 | 9.0.0:p16 | 9.0.0:p17 | 9.0.0:p18 | 9.0.0:p19 | 9.0.0:p2 | 9.0.0:p20 | 9.0.0:p21 | 9.0.0:p22 | 9.0.0:p23 | 9.0.0:p24 | 9.0.0:p24.1 | 9.0.0:p25 | 9.0.0:p26 | 9.0.0:p27 | 9.0.0:p28 | 9.0.0:p29 | 9.0.0:p3 | 9.0.0:p30 | 9.0.0:p31 | 9.0.0:p32 | 9.0.0:p33 | 9.0.0:p34 | 9.0.0:p35 | 9.0.0:p36 | 9.0.0:p37 | 9.0.0:p38 | 9.0.0:p39 | 9.0.0:p4 | 9.0.0:p40 | 9.0.0:p41 | 9.0.0:p42 | 9.0.0:p5 | 9.0.0:p6 | 9.0.0:p7 | 9.0.0:p8 | 9.0.0:p9

References (4)