HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

CISA Orders Federal Agencies to Patch Actively Exploited Zimbra XSS Vulnerability (CVE‑2025‑66376)

CISA has mandated that all Federal Civilian Executive Branch agencies patch CVE‑2025‑66376, a stored XSS flaw in Zimbra Collaboration Suite that is being actively exploited. The vulnerability enables unauthenticated attackers to run arbitrary JavaScript via malicious email HTML, risking session hijack and data theft across government and private‑sector deployments.

🛡️ LiveThreat™ Intelligence · 📅 March 19, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

CISA Orders Federal Agencies to Patch Actively Exploited Zimbra XSS Vulnerability (CVE‑2025‑66376)

What Happened — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a Binding Operational Directive requiring all Federal Civilian Executive Branch agencies to remediate a high‑severity stored cross‑site scripting (XSS) flaw (CVE‑2025‑66376) in the Zimbra Collaboration Suite. The vulnerability is known to be actively exploited in the wild, allowing unauthenticated attackers to inject malicious JavaScript via crafted email HTML.

Why It Matters for TPRM

  • An exploited XSS flaw can hijack user sessions, expose confidential communications, and serve as a foothold for broader compromise of third‑party email platforms.
  • Zimbra is deployed by thousands of private‑sector enterprises and government entities; a breach can cascade to partner organizations and supply‑chain data flows.
  • Failure to patch may violate contractual security clauses and regulatory requirements for data protection.

Who Is Affected — Government agencies, large enterprises, SaaS providers, and any organization that hosts or consumes Zimbra Collaboration Suite for email and collaboration.

Recommended Actions

  • Verify whether any of your third‑party vendors or internal teams run Zimbra servers and confirm patch status.
  • If Zimbra is used, apply the November 2025 patch immediately; if mitigation is unavailable, consider temporary migration to an alternative platform.
  • Update your third‑party risk registers to reflect the elevated risk and require proof of remediation from affected suppliers.

Technical Notes — The flaw resides in the Classic UI’s handling of CSS @import directives within email HTML, enabling stored XSS that executes arbitrary JavaScript in the victim’s browser. Exploitation can lead to session hijacking, credential theft, and data exfiltration. CVE‑2025‑66376 was publicly disclosed and patched in November 2025, but active exploitation continues. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.