Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Organizations Warned of Exploited Zimbra Collaboration Vulnerability

CISA has added the Zimbra flaw to the KEV catalog along with three other bugs exploited in the wild.

CISA KEV

The US cybersecurity agency CISA on Thursday urged federal agencies to patch their Zimbra Collaboration Suite instances against a security defect actively exploited in the wild.

Tracked as CVE-2025-68645, the exploited Zimbra vulnerability is described as a local file inclusion (LFI) issue affecting the appliance’s webmail UI.

The bug exists because the RestFilter servlet fails to properly handle user-supplied request parameters, allowing attackers to send crafted requests.

By influencing internal request routing, attackers can include arbitrary files from the WebRoot directory without authentication.

Successful exploitation of the flaw could lead to the disclosure of sensitive information and internal paths, reconnaissance, and further compromise, if chained with other security weaknesses.

Patches for the flaw were released on November 6, 2025, in Zimbra Collaboration Suite versions 10.1.13 and 10.0.18.

Advertisement. Scroll to continue reading.

On Thursday, CISA added CVE-2025-68645 to its Known Exploited Vulnerabilities (KEV) catalog, without providing details on the observed attacks.

According to CrowdSec, however, threat actors have been abusing the vulnerability in highly targeted attacks, as part of sophisticated, intelligence-driven campaigns.

Exploitation of the security defect has been surging, suggesting widespread interest from threat actors, CrowdSec notes.

In addition to the Zimbra weakness, CISA expanded the KEV list with three other bugs, urging federal agencies to address them within three weeks, as the Binding Operational Directive (BOD) 22-01 mandates.

The issues newly flagged as exploited include CVE-2025-54313, which refers to malicious code included in the eslint-config-prettier package as part of a supply chain attack in July 2025, CVE-2025-31125, an improper access control vulnerability in the Vite frontend development framework, and CVE-2025-34026, an authentication bypass in the Versa Concerto SD-WAN orchestration platform.

While BOD 22-01 applies only to federal agencies, all organizations are advised to review CISA’s KEV catalog and address the security defects it identifies.

Related: Fresh SmarterMail Flaw Exploited for Admin Access

Related: CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries

Related: Critical HPE OneView Vulnerability Exploited in Attacks

Related: Fresh MongoDB Vulnerability Exploited in Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.