CVE-2025-68645

8.8 HIGH CISA KEV

📋 TL;DR

An unauthenticated remote attacker can exploit this Local File Inclusion vulnerability in Zimbra Collaboration's Webmail Classic UI to read arbitrary files from the WebRoot directory. This affects Zimbra Collaboration 10.0 and 10.1 installations with the vulnerable RestFilter servlet exposed. Attackers can access sensitive configuration files, source code, or other web-accessible content.

💻 Affected Systems

Products:
  • Zimbra Collaboration (ZCS)
Versions: 10.0 and 10.1
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Webmail Classic UI; Modern UI may not be vulnerable. Requires /h/rest endpoint to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers read sensitive configuration files containing database credentials, encryption keys, or authentication secrets, leading to full system compromise and data exfiltration.

🟠

Likely Case

Attackers access configuration files to gather intelligence for further attacks or read application source code to discover additional vulnerabilities.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to reading non-sensitive web files without system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zimbra Security Center for latest patched versions

Vendor Advisory: https://wiki.zimbra.com/wiki/Security_Center

Restart Required: Yes

Instructions:

1. Check Zimbra Security Center for latest patches. 2. Apply the security patch for your ZCS version. 3. Restart Zimbra services. 4. Verify the fix by testing the vulnerability.

🔧 Temporary Workarounds

Block /h/rest endpoint

linux

Temporarily block access to the vulnerable RestFilter servlet endpoint

# Add to web server configuration (e.g., Apache/Nginx) to block /h/rest
location /h/rest { deny all; }

Disable Webmail Classic UI

linux

Disable the vulnerable Classic UI if Modern UI suffices

# Modify Zimbra configuration to disable Classic UI
zmprov ms `zmhostname` zimbraFeatureClassicWebClientEnabled FALSE
zmmailboxdctl restart

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to Zimbra web interfaces
  • Deploy a web application firewall (WAF) with LFI protection rules

🔍 How to Verify

Check if Vulnerable:

Test if /h/rest endpoint responds to crafted LFI requests or check Zimbra version

Check Version:

zmcontrol -v

Verify Fix Applied:

Attempt to exploit the vulnerability after patching; requests should be blocked or return errors

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /h/rest endpoint with file path parameters
  • Multiple failed attempts to access restricted files

Network Indicators:

  • HTTP requests with crafted parameters targeting /h/rest
  • Unusual file read patterns from web server

SIEM Query:

source="zimbra.log" AND uri="/h/rest" AND (param="file" OR param="path")

🔗 References

📤 Share & Export