⚠️ CISA Known Exploited Vulnerability
Active ThreatThis vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.
CVE-2025-68645
High CISA KEVVulnerability Description
A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Known Affected Software
24 configuration(s) from 1 vendor(s)
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.10:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.13:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.4:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.8:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.7:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.5:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.5:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.14:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.6:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.11:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.7:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.4:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.9:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.0:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.8:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.0.12:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.6:*:*:*:*:*:*:*
References & Resources
-
https://wiki.zimbra.com/wiki/Security_Centercve@mitre.org Release Notes Vendor Advisory
-
https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policycve@mitre.org Product
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-68645134c704f-9b21-4f2e-91b3-4a467353bcc0 US Government Resource
Severity Details
CISA KEV Status
Listed in CISA's Known Exploited Vulnerabilities catalog
Weakness Type (CWE)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
- Description
- The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- Abstraction Level
- Variant
Key Information
- Published Date
- December 22, 2025
External Resources
Related News Articles
Latest news and updates about CVE-2025-68645
