CVE-2025-25065

5.3 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Zimbra Collaboration's RSS feed parser. It allows attackers to redirect requests to internal network endpoints, potentially accessing sensitive internal services. Affected users are those running Zimbra Collaboration 9.0.0 before Patch 43, 10.0.x before 10.0.12, or 10.1.x before 10.1.4.

💻 Affected Systems

Products:
  • Zimbra Collaboration
Versions: 9.0.0 before Patch 43, 10.0.x before 10.0.12, 10.1.x before 10.1.4
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires RSS feed functionality to be enabled/used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to other internal systems, potentially leading to full network compromise.

🟠

Likely Case

Unauthorized access to internal HTTP endpoints, information disclosure from internal services, or limited internal network reconnaissance.

🟢

If Mitigated

Limited impact if network segmentation restricts internal service access or if vulnerable component is not internet-facing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity when the vulnerable endpoint is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.0 Patch 43, 10.0.12, or 10.1.4

Vendor Advisory: https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories

Restart Required: Yes

Instructions:

1. Backup your Zimbra installation. 2. Download the appropriate patch from Zimbra's release pages. 3. Apply the patch following Zimbra's upgrade documentation. 4. Restart Zimbra services.

🔧 Temporary Workarounds

Disable RSS Feed Parser

linux

Temporarily disable the vulnerable RSS feed parser functionality.

zmprov mcf +zimbraFeatureRSSFeedsEnabled FALSE
zmmailboxdctl restart

Network Segmentation

linux

Restrict Zimbra server's outbound network access to internal services.

iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to limit Zimbra server's access to internal services.
  • Deploy a web application firewall (WAF) with SSRF protection rules.

🔍 How to Verify

Check if Vulnerable:

Check Zimbra version: su - zimbra -c 'zmcontrol -v' and compare against affected versions.

Check Version:

su - zimbra -c 'zmcontrol -v'

Verify Fix Applied:

Verify version is 9.0.0 Patch 43 or higher, 10.0.12 or higher, or 10.1.4 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RSS feed parsing requests
  • Outbound HTTP requests from Zimbra to internal IP ranges

Network Indicators:

  • HTTP requests from Zimbra server to internal services on non-standard ports

SIEM Query:

source="zimbra.log" AND "RSS" AND ("127.0.0.1" OR "192.168." OR "10." OR "172.16.")

🔗 References

📤 Share & Export