May 22 Advisory: Synacor Zimbra Collaboration Suite XSS Vulnerability Added to CISA KEV [CVE-2024-27443]

Rapid Response

Vulnerability Description

CVE-2024-27443 is a Cross-Site Scripting (XSS) vulnerability (CVSS 6.1) affecting Zimbra Collaboration Suite (ZCS) versions 9.0 and 10.0.

The issue lies within the CalendarInvite feature of Zimbra’s Classic Web Client interface, where insufficient input validation of the Calender header allows for a stored cross-site scripting (XSS) attack. 

An attacker can exploit this flaw by embedding a malicious payload into a crafted calendar header of an email. When a target views the message using the classic interface, the payload executes within their session context, enabling arbitrary JavaScript execution.

Threat Activity

CVE-2024-27443 was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on May 19, 2025. At the time of writing, no public proof-of-concept (PoC) exploit has been identified.

Recent reporting by ESET researchers suggests that the Sednit group (also known as APT28, Fancy Bear, Forest Blizzard, or Sofacy) may be linked to exploitation of this vulnerability as part of a broader campaign dubbed Operation RoundPress. This campaign targeted webmail platforms to facilitate credential theft and persistent access. For more information, refer to their full analysis

FieldDetails
CVE-IDCVE-2024-27443 – CVSS 6.1 (medium) – assigned by CISA-ADP
Vulnerability DescriptionA Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim’s session, potentially leading to execution of arbitrary JavaScript code.
Date of DisclosureAugust 12, 2024
Date Reported as Actively ExploitedMay 19, 2025
Affected AssetsCalenderInvite feature of Zimbra webmail classic user interface of ZCS. 
Vulnerable Software Versions ZCS 9.0.0 (patches 1-38)ZCS 10.0.0 – 10.0.6
PoC Available?We did not observe any public exploits available at the time of writing. 
Exploitation StatusESET researchers reported evidence of Sednit Group (also known as APT28, Fancy Bear, Forest Blizzard, or Sofacy) exploiting this vulnerability and it was added to CISA KEV on May 19, 2025. 
Patch StatusThis vulnerability has been patched in ZCS 10.0.7 and 9.0.0 Patch 39

Censys Perspective

At the time of writing, Censys observed a total of 129,131 exposed ZCS instances that may potentially be vulnerable to this exploit. The vast majority are hosted within cloud infrastructure, distributed across a wide range of providers without any being disproportionately represented. 

In contrast, we observed 33,614 on-premises ZCS hosts. These are primarily associated with IPs serving multiple hostnames, suggesting shared infrastructure. 

Note that not all instances observed are necessarily vulnerable as we do not have specific versions available, and we are unable to verify if these devices are running the Zimbra webmail classic user interface. 

Censys Platform Query:

host.services.software: (vendor: "Zimbra" and product: "Collaboration") or web.software: (vendor: "Zimbra" and product: "Collaboration")

Censys Legacy Search Query:

services.software: (vendor="Zimbra" and product="Collaboration")

Censys ASM Query:

host.services.software: (vendor="Zimbra" and product="Collaboration") or web_entity.instances.software: (vendor="Zimbra" and product="Collaboration")
Screenshot-2025-05-22-at-9.35.07-AM.png
Map of Exposed ZCS Devices

References

Subscribe to our blog