Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Home/CyberSecurity News/CISA Warns: Zimbra Vulnerability Exploited in Collaboration Suite
CyberSecurity News

CISA Warns: Zimbra Vulnerability Exploited in Collaboration Suite

A high-severity vulnerability impacting the Zimbra Collaboration Suite (ZCS) has been added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities...

Emy Elsamnoudy
Emy Elsamnoudy
March 19, 2026 2 Min Read
0 0

A high-severity vulnerability impacting the Zimbra Collaboration Suite (ZCS) has been added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog.

Tracked as CVE-2025-66376, this security flaw is currently facing active exploitation in the wild. Organizations utilizing Zimbra must urgently prioritize remediation to prevent unauthorized access and potential data compromise.

The vulnerability is a stored cross-site scripting (XSS) issue in the Classic User Interface of the Zimbra Collaboration Suite.

Threat actors can exploit this weakness by crafting malicious emails containing specifically formatted code. The attack relies on abusing Cascading Style Sheets (CSS) @import directives embedded directly within the HTML body of the email.

When a target opens the malicious message in the Classic UI, the embedded scripts run automatically in the context of the user’s active session.

This execution bypasses standard security boundaries, allowing attackers to potentially harvest session cookies, access sensitive email data, or execute unauthorized commands on behalf of the victim.

While it remains unknown whether this exploit is tied to ongoing ransomware campaigns, its ease of delivery via email makes it a critical threat.

Zimbra addressed this vulnerability in recent patch releases, specifically versions 10.1.13 and 10.0.18. Applying the patch fully mitigates the stored XSS vulnerability. As part of the security overhaul, Zimbra also upgraded the AntiSamy security library to version 1.7.8 and removed outdated, risky code from the platform.

Beyond security fixes, the 10.1.13 update delivers substantial user experience and performance enhancements. Administrators benefit from improved TLS handling, optimized memory management, and faster loading of email threads.

End-users gain a refined Modern Web App experience, featuring improved drag-and-drop file management, reliable copy-paste formatting from Microsoft Office, and enhanced tag organization.

Additionally, the update ensures compatibility with Outlook 2024 and maintains support for Legacy Exchange Web Services (EWS).

CISA Mandate and EOL Warning

In response to the active exploitation, CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies apply the necessary Zimbra patches by April 1, 2026.

Private organizations are strongly encouraged to follow this same deadline. If applying the patch is not possible, CISA recommends discontinuing the use of the vulnerable product immediately.

System administrators must also note that Zimbra version 10.0 officially reached its End of Life (EOL) on December 31, 2025.

Organizations still operating on the 10.0 release cycle must plan an immediate migration to Zimbra 10.1 to maintain security compliance.

Operating on an EOL platform will leave infrastructure permanently exposed to future unpatched vulnerabilities.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchransomwareSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

CISA: Secure Microsoft Intune After Stryker Urges Organizations

Next Post

Authorities Disrupt IoT Botnet Infrastructure Behind

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Fake CAPTCHA Campaign Uses SMS Pumping Fraud Victims’
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us