Description
An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. An XML External Entity (XXE) vulnerability exists in the Zimbra Exchange Web Services (EWS) SOAP interface due to improper handling of XML input. An authenticated attacker can submit crafted XML data that is processed by an XML parser with external entity resolution enabled. Successful exploitation may allow disclosure of sensitive local files from the server.
Published: 2026-03-20
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Exposure of local file contents via authenticated XML processing
Action: Patch Immediately
AI Analysis

Impact

This vulnerability allows an attacker who can authenticate to the Zimbra Exchange Web Services (EWS) SOAP interface to submit specially crafted XML that includes external entity references. The server’s XML parser resolves these references, resulting in the ability to read files residing on the Zimbra server machine. The impact is the disclosure of potentially sensitive configuration files, credentials, or other internal data, compromising confidentiality. The weakness is characterized as CWE-611, a classic XML External Entity condition. No denial‑of‑service or execution path is noted, so the threat is limited to data exposure. The CVSS base score of 4.3 indicates a low‑to‑moderate severity, reflecting that the requirement for authentication and the nature of the data disclosed keep the risk profile modest compared to higher‑scoring bugs.

Affected Systems

The issue affects Zimbra Collaboration Suite releases 10.0 and 10.1. All editions of those major releases that expose the EWS SOAP interface are vulnerable. Administrators should verify whether their deployment is running any of the 10.0.x or 10.1.x branches, as the problem is specific to those major versions.

Risk and Exploitability

The exploit requires an authenticated user and the ability to send SOAP requests, meaning the threat vector is realistic within an internal network or for any attacker that has compromised credentials. The EPSS score of less than 1% indicates that active exploitation is currently unlikely; the vulnerability is not listed in the CISA KEV catalog. However, the low explosion probability does not negate the need for remediation, as the data exposed could be valuable. The CVSS score suggests the risk is moderate; combined with the requirement for authentication, its overall danger level is lower than Remote Code Execution bugs but still sufficient to warrant prompt action.

Generated by OpenCVE AI on April 2, 2026 at 04:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Zimbra Collaboration Suite security update, at least version 10.1.16, which removes the XML entity processing flaw.
  • If an update is not immediately possible, reconfigure the Zimbra XML parser to disable external entity resolution or restrict the set of allowable external entities.
  • Ensure that EWS SOAP endpoints are protected behind authentication and network segmentation to limit exposure.
  • Verify that no custom or legacy EWS extensions are still using unsecured XML processing before deploying a patch.

Generated by OpenCVE AI on April 2, 2026 at 04:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title XML External Entity Vulnerability in Zimbra Collaboration 10.0/10.1 EWS SOAP Interface

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Synacor
Synacor zimbra Collaboration Suite
CPEs cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
Vendors & Products Synacor
Synacor zimbra Collaboration Suite

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Title XML External Entity Vulnerability in Zimbra Collaboration 10.0/10.1 EWS SOAP Interface

Mon, 23 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-611
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Zimbra
Zimbra collaboration
Vendors & Products Zimbra
Zimbra collaboration

Fri, 20 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. An XML External Entity (XXE) vulnerability exists in the Zimbra Exchange Web Services (EWS) SOAP interface due to improper handling of XML input. An authenticated attacker can submit crafted XML data that is processed by an XML parser with external entity resolution enabled. Successful exploitation may allow disclosure of sensitive local files from the server.
References

Subscriptions

Synacor Zimbra Collaboration Suite
Zimbra Collaboration
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-23T13:39:46.789Z

Reserved: 2026-03-19T00:00:00.000Z

Link: CVE-2026-33371

cve-icon Vulnrichment

Updated: 2026-03-23T13:39:10.282Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T14:16:16.240

Modified: 2026-04-01T15:35:47.497

Link: CVE-2026-33371

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:59:39Z

Weaknesses