SQL injection vulnerability in the ZimbraSync Service SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4 due to insufficient sanitization of a user-supplied parameter. Authenticated attackers can exploit this vulnerability by manipulating a specific parameter in the request, allowing them to inject arbitrary SQL queries that could retrieve email metadata.
References
| Link | Resource |
|---|---|
| https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.12#Security_Fixes | Release Notes |
| https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.4#Security_Fixes | Release Notes |
| https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-02-03 20:15
Updated : 2025-06-11 21:18
NVD link : CVE-2025-25064
Mitre link : CVE-2025-25064
CVE.ORG link : CVE-2025-25064
JSON object : View
Products Affected
synacor
- zimbra_collaboration_suite
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
