Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2025-68645

A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilt...
Back to all
CVE

CVE-2025-68645

A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilt...

A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.8
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://wiki.zimbra.com/wiki/ZimbraResponsibleDisclosurePolicy, https://www.cisa.gov/known-exploited-vulnerabilities-catalog?fieldcve=CVE-2025-68645, https://wiki.zimbra.com/wiki/Security_Center

Severity

8.8

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
8.8
EPSS Probability
0.25367%
EPSS Percentile
0.96102%
Introduced Version
b68c7b31a1d94f94903a79c53f1bd316b792de1d,de2f187263204c5edbcd64ab4aad155367f27eef,5a574c4741e2713147c61524e30057679ece2ec6,e94be3228495cb215d7bb70d6ae24bc8a42cc01f
Fix Available
c2fac09a3333bcb767866afa3203541da2e8729c,2aecfa967aa09146bbab421bd09c242a420fff0e,035c4371687d035685fd572d03a55e6cabf2383c,f84684c7abd7ba2681e64499bf54719c764565e1

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading