Fixing and finding
Jump to remediation plan
CVE ID

CVE-2025-68645

Published 2025-12-22
Updated 4 months ago
Vendor/s
Synacor
Product/s
Zimbra Collaboration Suite (ZCS)
Version/s
10.0.0 > 10.0.18
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
8.8
/ 10
High
Severity Details
Base score
8.8 High
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2025-68645 is a high-severity (8.8) LFI vulnerability in Zimbra ZCS 10.0 and 10.1, actively exploited by unauthenticated remote attackers.

CPE

Synacor logo
Synacor
Product Version Start Version End (excl.) Status
zimbra_collaboration_suite 10.0.0 10.0.18 vulnerable
zimbra_collaboration_suite 10.1.0 10.1.13 vulnerable

Related weakness (CWE)

CWE-98

Remediation plan

1

Apply official patches

Immediately install the latest security patches provided by Synacor for Zimbra Collaboration Suite to resolve the improper parameter handling within the RestFilter servlet.

2

Update affected systems

Upgrade Zimbra Collaboration Suite (ZCS) deployments to version 10.0.18 or higher for the 10.0 branch, and version 10.1.13 or higher for the 10.1 branch.

3

Restrict access

Apply Web Application Firewall (WAF) rules to filter malicious requests to the /h/rest endpoint and consider restricting access to the Classic UI to known, trusted IP ranges.

4

Monitor for exploitation

Review web server access logs for suspicious activity targeting the /h/rest endpoint, specifically looking for directory traversal patterns or unusual internal file requests.

Detection Guidance

To detect potential exploitation, analyze web server logs for HTTP requests directed at the /h/rest endpoint that contain path traversal sequences or unexpected parameters. Monitor for unauthorized access to sensitive files within the Zimbra WebRoot directory. Organizations should also look for unusual internal request dispatching patterns originating from the RestFilter servlet and deploy network signatures that identify unauthenticated LFI attempts targeting Zimbra's Classic UI.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management