Zimbra security updates: Attackers can read email metadata

Among other things, the Zimbra developers have closed at least one critical gap in the e-mail and groupware solution.

listen Print view
Person typing on laptop.

(Image: Day Of Victory Studio/Shutterstock.com)

1 min. read

Admins should update their Zimbra servers to the latest version for security reasons. Updates closed several vulnerabilities. Although there are currently no reports of attacks, the developers advise users to update quickly.

In the security section of the Zimbra website, they list several security vulnerabilities, some of which have not yet been assigned a CVE designation. They classify one gap as “critical” and attackers can execute their code as part of an XSS attack. No further details are currently known.

However, details of one “critical” vulnerability (CVE-2025-25064) have already been published. Authenticated attackers can use special requests to exploit the vulnerability. Because user input is not sufficiently checked, attackers can inject their SQL commands at this point to gain access to email metadata.

Another known vulnerability (CVE-2025-25065 “medium”) allows attackers to bend server connections.

Videos by heise

To protect systems against the attacks, admins must install the secured versions 9.0.0 Patch 44, 10.0.13 or 10.1.5 .

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.