CVE-2025-41066

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:horde:groupware:5.2.22:*:*:*:-:*:*:*

History

03 Dec 2025, 20:08

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CPE cpe:2.3:a:horde:groupware:5.2.22:*:*:*:-:*:*:*
References () https://www.incibe.es/en/incibe-cert/notices/aviso/disclosure-sensitive-information-horde-groupware - () https://www.incibe.es/en/incibe-cert/notices/aviso/disclosure-sensitive-information-horde-groupware - Third Party Advisory
First Time Horde
Horde groupware

02 Dec 2025, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-02 14:16

Updated : 2025-12-03 20:08


NVD link : CVE-2025-41066

Mitre link : CVE-2025-41066

CVE.ORG link : CVE-2025-41066


JSON object : View

Products Affected

horde

  • groupware
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor