Over 10,000 Zimbra Servers Exposed to Persistent XSS Threats
Security Flaw Exposes Thousands of Zimbra Servers to Ongoing XSS Attacks
A significant number of Zimbra Collaboration Suite (ZCS) instances are vulnerable to ongoing attacks exploiting a cross-site scripting (XSS) security flaw, according to the nonprofit security organization Shadowserver.
Vulnerability Overview
- The vulnerability, tracked as CVE-2025-48700, affects versions 8.8.15, 9.0, 10.0, and 10.1 of the ZCS.
- The flaw allows unauthenticated attackers to access sensitive information after executing arbitrary JavaScript within the user’s session.
However, numerous Zimbra servers remain unpatched, with over 10,500 instances exposed online still vulnerable to attacks.
Exposure Statistics
- Mostly located in Asia (3,794) and Europe (3,793).
The US Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-48700 to its Known Exploited Vulnerabilities (KEV) Catalog on April 21, citing evidence of active exploitation.
In a separate incident, the state-sponsored APT28 group, also known as Fancy Bear or Strontium, exploited another XSS vulnerability (CVE-2025-66376) in Zimbra webmail sessions in phishing attacks targeting Ukrainian government entities starting in January.
This is not the first time Zimbra vulnerabilities have been exploited in attacks. In February 2023, Russian Winter Vivern cyberespies used a reflected XSS exploit to breach Zimbra webmail portals and steal emails sent and received by NATO-aligned organizations and individuals.
