An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
{
"versions": [
{
"introduced": "10.0.0"
},
{
"fixed": "10.0.13"
},
{
"introduced": "10.1.0"
},
{
"fixed": "10.1.5"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-NA"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p19"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p20"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p23"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p25"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p26"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p27"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p28"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p33"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p36"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p37"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p38"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p4"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p7"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p10"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p11"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p13"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p14"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p16"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p17"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p18"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p2"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p22"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p24"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p24\\.1"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p29"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p3"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p30"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p32"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p34"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p39"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p40"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p41"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p43"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p5"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p6"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p8"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p9"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-27915.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p15"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p21"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p31"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p35"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p42"
}
]
}
]