Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
Advisories

No advisories yet.

Fixes

Solution

No solution has been reported at this time.


Workaround

No workaround given by the vendor.

History

Tue, 02 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Description Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
Title Disclosure of sensitive information in Horde Groupware
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-12-02T14:27:37.506Z

Reserved: 2025-04-16T09:09:34.457Z

Link: CVE-2025-41066

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-02T14:16:24.910

Modified: 2025-12-02T14:16:24.910

Link: CVE-2025-41066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.