Home / CVE DB / CVE-2025-68645
Standard
Vulnerability Identifier

CVE-2025-68645

2025-12-22
Severity Assessment
8.8
HIGH
CVSS v3.x Score

CISA KEV Active Alert

Date Added
01 Jan 1970
Due Date
N/A
Required Action
Apply updates per vendor instructions.
Clinical Analysis (Description)

A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.

Vector Sequencing

Attack Parameters

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Impact Consequences

Technical Impact

Unchanged
Scope
High
Confidentiality
High
Integrity
High
Availability
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Weakness Classification

CWE-CWE-98

Affected Population

Affected Configurations

Total: 24 detected entries

Software List Scrollable
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.10
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.13
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.4
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.8
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.7
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.5
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.5
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.14
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.1
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.6
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.11
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.7
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.2
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.0
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.4
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.1
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.9
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.2
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.0
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.3
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.8
sy
zimbra_collaboration_suite
Vendor: synacor • v10.0.12
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.3
sy
zimbra_collaboration_suite
Vendor: synacor • v10.1.6
Timeline

Time Line

PUBLICATION
22 Dec 2025
MODIFICATION
23 Jan 2026
Impact Statistics

Key Metrics

CVSS Score
8.8
HIGH
Products
24
Affected
Articles
2
Published
Active Exploitation Confirmed
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Associated Cyber Intelligence

Related News Articles

2 article(s) mentioning this vulnerability

Article #1

CISA ajoute quatre vulnérabilités actuellement exploitées au catalogue KEV

CISA met à jour son catalogue KEV avec quatre nouvelles vulnérabilités de sécurité actuellement exploitées.

7
29 Mar 2026 vulnérabilité HIGH
Article #2
7

CISA Adds Four Active Exploited Software Vulnerabilities to KEV Catalog

CISA updates its Known Exploited Vulnerabilities (KEV) catalog with four new security flaws that have been actively exploited.

29 Mar 2026 vulnerability HIGH
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.

⚠️ MAXIMUM PRIORITY - Immediate action required