U.S. Authorities Warn of Zimbra Vulnerability Exploited in Zero-Day Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a newly discovered vulnerability affecting the Zimbra Collaboration Suite (ZCS) — a widely used email and collaboration platform developed by Synacor.
According to CISA’s October 7, 2025 update, the flaw has been actively exploited in the wild, with reports suggesting that military-related entities are among the targets. The vulnerability, tracked as CVE-2025-27915, has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog.
The issue lies in the Classic Web Client of Zimbra, specifically in how it handles ICS calendar files. Improper validation during the processing of these files can lead to a cross-site scripting (XSS) vulnerability.
If a user opens an email containing a maliciously crafted ICS file, it can trigger the execution of harmful scripts, potentially allowing attackers to:
CISA has urged all U.S. federal agencies and organizations using Zimbra to apply necessary mitigations immediately. Users are advised to:
Zimbra is used globally across government, education, and enterprise environments, making this vulnerability particularly high-risk.
The exploit highlights how attackers continue to target collaboration and email systems to infiltrate sensitive networks. With the ongoing rise in zero-day attacks, proactive patch management and endpoint monitoring are more critical than ever.
For the latest alerts and guidance, visit CISA’s Known Exploited Vulnerabilities Catalog or review the official Zimbra security advisories.