Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution has been reported at this time.
Workaround
No workaround given by the vendor.
References
History
Tue, 02 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user. | |
| Title | Disclosure of sensitive information in Horde Groupware | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-12-02T14:27:37.506Z
Reserved: 2025-04-16T09:09:34.457Z
Link: CVE-2025-41066
No data.
Status : Received
Published: 2025-12-02T14:16:24.910
Modified: 2025-12-02T14:16:24.910
Link: CVE-2025-41066
No data.
OpenCVE Enrichment
No data.