What's Happening?
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to federal agencies to patch a critical vulnerability in the Zimbra Collaboration Suite. This security flaw, identified as CVE-2025-68645, is a local file inclusion
(LFI) issue that affects the webmail user interface of the Zimbra appliance. The vulnerability arises from the RestFilter servlet's improper handling of user-supplied request parameters, allowing attackers to send crafted requests. This can lead to the inclusion of arbitrary files from the WebRoot directory without authentication, potentially resulting in the disclosure of sensitive information and further system compromise. Patches for this flaw were released on November 6, 2025, in Zimbra Collaboration Suite versions 10.1.13 and 10.0.18. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, highlighting its active exploitation in the wild. CrowdSec reports that threat actors are leveraging this vulnerability in targeted attacks as part of sophisticated, intelligence-driven campaigns.
Why It's Important?
The exploitation of the Zimbra vulnerability poses significant risks to federal agencies and potentially other organizations using the software. The ability for attackers to access sensitive information and compromise systems underscores the critical need for timely patching and vulnerability management. The inclusion of this vulnerability in CISA's KEV catalog indicates a high level of threat activity and interest from malicious actors. This situation highlights the ongoing challenges in cybersecurity, particularly in managing and mitigating risks associated with software vulnerabilities. The directive for federal agencies to address this and other vulnerabilities within a specified timeframe reflects the urgency and importance of maintaining robust cybersecurity defenses to protect sensitive government data and infrastructure.
What's Next?
Federal agencies are required to address the Zimbra vulnerability and other newly flagged security issues within three weeks, as mandated by the Binding Operational Directive (BOD) 22-01. While this directive specifically applies to federal entities, CISA advises all organizations to review and address the vulnerabilities listed in its KEV catalog. This proactive approach is essential to prevent potential breaches and mitigate the impact of ongoing exploitation attempts. Organizations must remain vigilant and ensure that their cybersecurity measures are up-to-date to defend against evolving threats.









