Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-68645

Local File Inclusion in Zimbra Collaboration Webmail Classic UI: CVE‑2025‑68645 Explained

CVSS Gauge
CVSS Needle

Summary

CVE-2025-68645 is a critical Local File Inclusion (LFI) flaw in Zimbra Collaboration Suite’s Webmail Classic UI. Improper request handling in the RestFilter servlet lets unauthenticated attackers access files from the WebRoot. It affects ZCS 10.0.x (before 10.0.18) and 10.1.x (before 10.1.13). An immediate upgrade is recommended.

Urgent Actions Required

Which Systems Are Vulnerable to CVE‑2025‑68645?

Technical Overview

How Does the CVE‑2025‑68645 Exploit Work?

The attack typically follows these steps:

CVE‑2025‑68645

What Causes CVE‑2025‑68645?

Vulnerability Root Cause:

This issue originates from improper handling of usersupplied request parameters within the RestFilter servlet in Zimbra Collaboration Suite’s Webmail Classic UI. The servlet does not adequately validate or sanitize these inputs, allowing crafted requests sent to the /h/rest endpoint to alter internal request dispatching. The application can expose files from the WebRoot directory without needing authentication.

How Can You Mitigate CVE‑2025‑68645?

If immediate patching is delayed or not possible:  

  • Restrict public access to the /h/rest endpoint to limit exposure.
  • Disable the Webmail Classic UI if it is not required.
  • Review WebRoot directory permissions and remove or restrict access to sensitive files.
  • Monitor logs for unusual or suspicious requests to /h/rest.

Which Assets and Systems Are at Risk?

Will Patching CVE‑2025‑68645 Cause Downtime?

Patch application impact: Applying the fix requires upgrading Zimbra Collaboration Suite to ZCS 10.0.18 or ZCS 10.1.13 and later. The update may require planned maintenance, depending on the deployment model and upgrade process in use.

How Can You Detect CVE‑2025‑68645 Exploitation?

Remediation & Response

Compliance & Governance Notes

CVSS Breakdown Table

MetricValue Description
Base Score8.8Indicates a highseverity vulnerability with significant security impact
Attack Vector NetworkThe flaw can be exploited remotely over network-accessible Zimbra endpoints
Attack ComplexityLowExploitation does not require complex conditions or a specialized setup
Privileges RequiredNoneThe attacker does not need authentication or prior access
User InteractionRequiredExploitation requires user interaction
ScopeUnChangedThe impact is confined to the affected Zimbra application component
Confidentiality ImpactHighArbitrary file inclusion can expose sensitive files and internal paths
Integrity ImpactHighExploitation may enable manipulation or misuse of application behavior
Availability ImpactHighSuccessful abuse can significantly affect service stability or operations

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.