Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
Advisories

No advisories yet.

Fixes

Solution

No solution has been reported at this time.


Workaround

No workaround given by the vendor.

History

Wed, 03 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:horde:groupware:5.2.22:*:*:*:-:*:*:*
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Wed, 03 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Horde
Horde groupware
Vendors & Products Horde
Horde groupware

Tue, 02 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Description Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
Title Disclosure of sensitive information in Horde Groupware
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-12-02T14:27:37.506Z

Reserved: 2025-04-16T09:09:34.457Z

Link: CVE-2025-41066

cve-icon Vulnrichment

Updated: 2025-12-02T14:27:32.880Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-02T14:16:24.910

Modified: 2025-12-03T20:08:52.853

Link: CVE-2025-41066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-03T12:10:05Z

Weaknesses