A Russian state-sponsored threat actor has exploited a high-severity Cross-Site Scripting (XSS) vulnerability in Zimbra Collaboration's Classic UI, targeting entities in Ukraine. The flaw, identified as CVE-2025-66376 with a CVSS score of 7.2, impacts versions prior to 10.1.13 and 10.0.18. This XSS vulnerability arises from insufficient sanitization of Cascading Style Sheets (CSS) @import directives in HTML email messages, allowing attackers to reference external resources or inject inline scripts that execute upon the recipient opening an email within a browser. Successful exploitation can lead to remote code execution (RCE), enabling threat actors to compromise user email accounts and the broader Zimbra environment. CISA has listed this vulnerability as part of its Known Exploited Vulnerabilities catalog, emphasizing immediate patching due to active exploitation.
- Zimbra Collaboration Suite Classic UI
- Upgrade to Zimbra version 10.1.13 or later for major releases, or 10.0.18 or later for minor releases.
- Run the following command to update: sudo apt-get update && sudo apt-get install zimbra-core
- Verify installed version with: zmcontrol -v
Homelab environments using Zimbra Collaboration Suite Classic UI may be vulnerable if running outdated versions. Config files such as /opt/zimbra/conf/localconfig.xml should be reviewed for necessary updates.