![Ginbra Ginbra](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQA0xWo5M-_umc_W01aFMhEeDMq5Q7_wh28mC5JhcjFy1cNSHVe5pQ42U9N6iv9jIMS8BzmIOFJxuVqpAo7uwflNTsRy5jEEuKTPFrz5xXhwS5u9vWy5rzb9-QP_NOW8T9goxtPoGuTTCzoyDk8mh_K6tGhUALM_eLh3XaGYQRXz-pH3FJvkoU8RFmwfcr/s728-rw-e365/zibra.png)
Zimbra has released a software update to address critical security flaws in collaboration software.
The vulnerability tracked as CVE-2025-25064 has a CVSS score of 9.8 out of a maximum of 10.0. Zimbrasync service described as a SQL injection bug in the SOAP endpoint affecting versions prior to 10.0.12 and 10.1.4.
Because it is due to the lack of proper disinfection of user-supported parameters, an authenticated attacker is required to inject any SQL query that can retrieve email metadata by “manipulating specific parameters in the request.” could be weaponized by.
![Cybersecurity](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg)
Zimbra also said it addressed another important vulnerability related to stored cross-site scripting (XSS) in the Zimbra Classic web client. The defect has not yet been assigned a CVE identifier.
“This fix will enhance input disinfection and enhance security,” the company said in its advisory, adding that the issue has been fixed in versions 9.0.0 patches 44, 10.0.13 and 10.1.5. Ta.
Another vulnerability Zimbra deals with is CVE-2025-25065 (CVSS score: 5.3).
Security flaws are patched with versions 9.0.0 patches 43, 10.12, and 10.1.4. Customers are encouraged to update to the latest version of Zimbra Collaboration for optimal protection.
Source link