Technology

Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks

Zimbra XSS – More than 10,000 exposed Zimbra instances still appear unpatched for a known XSS flaw, prompting urgent guidance to secure servers quickly.

More than 10,000 Zimbra Collaboration Suite (ZCS) servers exposed to the internet are still vulnerable to an ongoing campaign exploiting a cross-site scripting (XSS) flaw, according to Misryoum.

The issue centers on CVE-2025-48700, a vulnerability affecting ZCS versions 8.8.15, 9.0, 10.0, and 10.1.. While patches were released by Zimbra’s parent company Synacor in June 2025. Misryoum reports that unpatched instances remain widely reachable online—creating a real-world problem for administrators who may not immediately see their servers included in scanners.

XSS sounds technical. but the practical risk is straightforward: the flaw can let an attacker run malicious JavaScript inside a user’s session.. In other words, the browser becomes the delivery point.. Misryoum also notes that the exploitation path does not require user interaction beyond viewing a maliciously crafted message in the Zimbra Classic UI. which lowers the barrier for attackers trying to convert exposure into compromise.

For organizations. the most concerning part is how quickly the attention moved from “vulnerability exists” to “active exploitation.” CISA flagged CVE-2025-48700 as being abused in the wild and added it to its Known Exploited Vulnerabilities (KEV) Catalog.. Misryoum further reports that CISA directed U.S.. Federal Civilian Executive Branch agencies to secure their Zimbra environments within a tight timeline—an escalation that usually signals credible operational impact. not theoretical risk.

Shadowserver. a security monitoring nonprofit. observed that more than 10. 500 Zimbra servers exposed online were still unpatched. with the largest concentrations located in Asia and Europe.. That geographic split matters because it hints at how patch management and asset visibility vary across regions—some organizations may be slower to roll out updates. while others may not have complete inventories of publicly reachable services.

The situation is also a reminder that email platforms are recurring targets.. Zimbra-related flaws have repeatedly ended up in phishing-driven attack chains. including earlier XSS cases that enabled attackers to breach email portals and steal content.. Misryoum has previously seen how attackers prefer routes that blend into normal workflows: crafted messages. browser execution. and sessions that already carry the permissions needed to reach sensitive mail.

A useful way to understand what’s happening is to separate two layers of risk: exposure and patch status.. Exposure refers to whether a server is reachable from the internet.. Patch status refers to whether the installed version is vulnerable.. Misryoum’s reporting suggests both are intersecting here—servers that are reachable and still on affected builds become easier for attackers to probe and. in cases of active abuse. easier to scale.

Another detail shaping the response is that “no suspicious links, no macros” is often the attacker’s goal.. Misryoum points to earlier exploitation patterns in which the entire malicious payload can live inside the HTML body of a single email.. That’s precisely why defenders can’t rely on simple content checks alone; the payload can be present without looking like a typical phishing link farm.. Even when users do nothing except open the message, the vulnerability can do the rest.

The broader lesson for IT and security teams is to treat KEV-bound vulnerabilities on internet-facing collaboration systems as operational emergencies.. Patch timing, user-interface exposure (for example, Classic UI paths), and public-facing reachability all need to be reviewed together.. In practical terms. Misryoum would expect organizations to prioritize confirming Zimbra versions. validating patch deployment across all nodes. and reducing public exposure where possible—then monitoring for suspicious session behavior tied to email views.

There’s also an implication for the next cycle of attacks.. When a platform like Zimbra becomes associated with repeated XSS-driven campaigns. attackers often test whether the defender’s patch cadence has slipped. whether some regional deployments lag behind. or whether older versions are still running in parallel.. Misryoum’s numbers suggest that even after vendor updates and agency guidance. the attack surface remains large enough for criminals to keep trying.

Why CVE-2025-48700 is different from “just another patch”

CVE-2025-48700 is being treated as a high-priority risk because it’s already showing up in active abuse and can execute JavaScript through a user’s session after viewing a crafted message.. That combination—real-world exploitation plus a low-friction trigger—turns patching into a near-term requirement, not a scheduled maintenance task.

What organizations should do now

Misryoum suggests the immediate priorities are confirming affected ZCS versions. ensuring Synacor’s security fixes are applied everywhere the service is reachable. and tightening access to reduce exposure of vulnerable interfaces.. Teams should also look for unusual session activity and phishing patterns aimed at Zimbra users. because attackers frequently pair technical vulnerabilities with familiar social engineering workflows.

The bigger pattern: email systems keep paying the attacker tax

Misryoum’s broader context here is how often email and collaboration platforms end up in the crosshairs for XSS. credential theft. and session compromise.. Once an exploit chain works reliably. it tends to be reused and adapted—so the best defense is not just one patch. but disciplined asset tracking. fast remediation. and continuous monitoring that assumes attackers are already scanning.