Zimbra Multiple Vulnerabilities
Multiple vulnerabilities were identified in Zimbra. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution and cross-site scripting on the targeted system.
Note:
CVE-2019-9621 is being exploited in the wild. Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery (SSRF) vulnerability via the ProxyServlet component. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. Hence, the risk level is rated as Extremely High Risk.
RISK: Extremely High Risk
TYPE: Servers – Internet App Servers

Impact
- Remote Code Execution
- Denial of Service
- Cross-Site Scripting
System / Technologies affected
- Zimbra Collaboration Suite up to and excluding 8.6.0
- Zimbra Collaboration Suite from including 8.7.0 up to and excluding 8.7.11
- Zimbra Collaboration Suite from including 8.8.0 up to and excluding 8.8.10
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.11/P11
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.9/P10
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.10/P8
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.11/P4
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.9/P10
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.12/P1
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.12
Vulnerability Identifier
Source
Related Link
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.11/P11
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.9/P10
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.10/P8
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.11/P4
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.9/P10
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.12/P1
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.12
- https://www.cisa.gov/news-events/alerts/2025/07/07/cisa-adds-four-known-exploited-vulnerabilities-catalog
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.