Impact
A Cross‑Site Scripting vulnerability exists in the Zimbra Classic UI, allowing an attacker to execute arbitrary JavaScript when a user views a crafted e‑mail message. The flaw stems from insufficient sanitization of HTML content, especially tag structures that include an @import directive or other script injection vectors. The resulting arbitrary code execution can lead to unauthorized access to sensitive information within the user's session. The vulnerability requires no additional user interaction beyond opening the mail.
Affected Systems
The flaw affects Zimbra Collaboration Suite 8.8.15, 9.0.0, 10.0, and 10.1, all deployed by Synacor. The CPE list enumerates many patch releases for 8.8.15 and 9.0.0, while the description references 10.0 and 10.1.
Risk and Exploitability
The CVSS score of 6.1 indicates a moderate severity vulnerability, while an EPSS score of 20% indicates a lower probability that this vulnerability will be exploited in the wild. The vulnerability is listed in the CISA KEV catalog, underscoring its real‑world impact. Attackers can exploit it by sending a specially crafted email that a user opens in the Classic UI, with no further credentials or actions required.
OpenCVE Enrichment
EUVD