Skip to main content
Mallory

Zimbra 10.1.16 Security Update Patches XSS, XXE, and Authenticated LDAP Injection

internet-facing-service-vulnerabilitywidely-deployed-product-advisoryidentity-authentication-vulnerability
Updated March 21, 2026 at 02:33 PM2 sources
Share:
Zimbra 10.1.16 Security Update Patches XSS, XXE, and Authenticated LDAP Injection

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Zimbra released version 10.1.16 with a strong recommendation that administrators upgrade immediately, citing high-severity issues and deployment risk. The update addresses multiple injection-class vulnerabilities affecting the collaboration suite, including cross-site scripting (XSS) in Webmail and Briefcase that could enable session hijacking and data theft via malicious script injection in a user’s browser.

The release also patches an XML External Entity (XXE) flaw in the EWS SOAP endpoint, which could potentially be abused for local file disclosure, denial-of-service conditions, or SSRF depending on environment and parser behavior, and fixes an authenticated LDAP injection issue where insufficient sanitization could allow a logged-in user to manipulate LDAP queries to access or influence directory data. In addition to these targeted fixes, Zimbra reports broader hardening such as stronger CSRF protections through improved token validation, alongside other security-related stability adjustments.

Timeline

  1. Feb 4, 2026

    Zimbra 10.1.16 fixes XSS, XXE, LDAP injection, and CSRF issues

    The 10.1.16 release patched multiple security flaws, including XSS in Webmail and Briefcase, an XXE issue in the EWS SOAP endpoint, and an authenticated LDAP injection vulnerability. It also strengthened CSRF protections through improved token validation and included related hardening changes.

  2. Feb 4, 2026

    Zimbra releases version 10.1.16 security update

    On February 4, 2026, Zimbra released Zimbra Collaboration 10.1.16 and urged administrators to upgrade promptly. The update was described as a significant or high-severity release with high deployment risk.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

February 13, 2026 at 12:33 AM

Related Stories

Zimbra Emergency Patch for Critical SSRF Vulnerability in Chat Proxy Configuration

Zimbra Emergency Patch for Critical SSRF Vulnerability in Chat Proxy Configuration

Zimbra released an emergency patch to address a critical Server-Side Request Forgery (SSRF) vulnerability affecting the chat proxy configuration in its Daffodil product. The vulnerability was identified in versions of Zimbra Daffodil prior to v10.1.12, prompting immediate action from the vendor. Security advisories highlighted the potential for attackers to exploit this flaw, which could allow unauthorized access to internal resources or sensitive information by manipulating the chat proxy configuration. The Canadian Centre for Cyber Security issued an alert (AV25-678) urging users and administrators to review the official Zimbra advisory and apply the necessary updates without delay. The emergency patch, included in Zimbra Daffodil version 10.1.12, was made available to mitigate the risk associated with this vulnerability. The flaw's critical nature raised concerns about the potential for remote exploitation, especially in environments where Zimbra's chat functionality is exposed to untrusted networks. Organizations relying on Zimbra for email and collaboration services were advised to prioritize patch deployment to prevent possible compromise. The vulnerability's disclosure and rapid patch release underscore the importance of timely vulnerability management in enterprise environments. Security experts noted that SSRF vulnerabilities can be leveraged to bypass network restrictions, access internal services, or facilitate further attacks. The Zimbra advisory provided technical details and guidance for administrators to verify successful patch application. No reports of active exploitation were mentioned at the time of the advisory, but the urgency of the patch suggests a high risk of exploitation if left unaddressed. The incident highlights the ongoing challenges faced by software vendors in securing complex collaboration platforms. Zimbra's response included not only the patch but also recommendations for monitoring and additional security best practices. The Cyber Centre's involvement reflects the vulnerability's significance for Canadian organizations and the broader global user base. Administrators were reminded to review their systems for signs of compromise and to ensure all relevant updates are applied promptly. The event serves as a reminder of the critical role of coordinated disclosure and rapid response in minimizing the impact of software vulnerabilities.

1 months ago
Actively Exploited Zimbra XSS Leaves Over 10,000 Servers Exposed

Actively Exploited Zimbra XSS Leaves Over 10,000 Servers Exposed

More than 10,000 internet-exposed **Zimbra Collaboration Suite** servers remain vulnerable to `CVE-2025-48700`, an actively exploited cross-site scripting flaw that affects ZCS versions `8.8.15`, `9.0`, `10.0`, and `10.1`. The bug lets unauthenticated attackers execute arbitrary JavaScript in a victim’s session and steal sensitive data when a user opens a malicious email in the **Zimbra Classic UI**. Synacor released patches in June 2025, but Shadowserver still reported roughly **10,500** exposed unpatched systems, with the largest concentrations in Asia and Europe. **CISA** has added `CVE-2025-48700` to its **Known Exploited Vulnerabilities** catalog and ordered Federal Civilian Executive Branch agencies to secure affected servers within days because the flaw is being abused in the wild. The warning follows a broader pattern of Zimbra vulnerabilities being used in espionage-focused campaigns, with reporting linking earlier exploitation of similar flaws to Russian-aligned groups including **APT28**, **APT29**, and **Winter Vivern** against Ukrainian entities, NATO-aligned organizations, and other targets.

5 days ago
Zimbra Webmail Classic UI Local File Inclusion Vulnerability

Zimbra Webmail Classic UI Local File Inclusion Vulnerability

A high-severity Local File Inclusion (LFI) vulnerability has been identified in the Webmail Classic UI of *Zimbra Collaboration Suite* (ZCS) versions 10.0 and 10.1. The flaw, tracked as `CVE-2025-68645`, arises from improper handling of user-supplied request parameters in the `RestFilter` servlet, allowing unauthenticated remote attackers to craft requests to the `/h/rest` endpoint and include arbitrary files from the WebRoot directory. This vulnerability exposes internal files to attackers, potentially leading to the disclosure of sensitive information and further compromise of affected Zimbra installations. Security researchers have highlighted the risk that this LFI vulnerability poses, as it can be exploited without authentication and may serve as a stepping stone for more advanced attacks. Organizations using Zimbra Collaboration Suite are urged to review their deployments and apply any available patches or mitigations to prevent exploitation. The vulnerability has been assigned a CVSS 3.1 score of 8.8, reflecting its high impact and ease of exploitation.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.