An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
cvssV3_1
|
Wed, 12 Mar 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-03-12T00:00:00.000Z
Updated: 2025-03-12T15:47:06.195Z
Reserved: 2025-03-10T00:00:00.000Z
Link: CVE-2025-27915

Updated: 2025-03-12T15:46:57.370Z

Status : Received
Published: 2025-03-12T15:15:39.900
Modified: 2025-03-12T16:15:24.543
Link: CVE-2025-27915

No data.