Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Posted on January 23, 2026January 23, 2026 By CWS

The US cybersecurity company CISA on Thursday urged federal companies to patch their Zimbra Collaboration Suite cases towards a safety defect actively exploited within the wild.

Tracked as CVE-2025-68645, the exploited Zimbra vulnerability is described as a neighborhood file inclusion (LFI) situation affecting the equipment’s webmail UI.

The bug exists as a result of the RestFilter servlet fails to correctly deal with user-supplied request parameters, permitting attackers to ship crafted requests.

By influencing inner request routing, attackers can embrace arbitrary recordsdata from the WebRoot listing with out authentication.

Profitable exploitation of the flaw might result in the disclosure of delicate info and inner paths, reconnaissance, and additional compromise, if chained with different safety weaknesses.

Patches for the flaw had been launched on November 6, 2025, in Zimbra Collaboration Suite variations 10.1.13 and 10.0.18.Commercial. Scroll to proceed studying.

On Thursday, CISA added CVE-2025-68645 to its Recognized Exploited Vulnerabilities (KEV) catalog, with out offering particulars on the noticed assaults.

In line with CrowdSec, nevertheless, menace actors have been abusing the vulnerability in extremely focused assaults, as a part of refined, intelligence-driven campaigns.

Exploitation of the safety defect has been surging, suggesting widespread curiosity from menace actors, CrowdSec notes.

Along with the Zimbra weak spot, CISA expanded the KEV listing with three different bugs, urging federal companies to deal with them inside three weeks, because the Binding Operational Directive (BOD) 22-01 mandates.

The problems newly flagged as exploited embrace CVE-2025-54313, which refers to malicious code included within the eslint-config-prettier package deal as a part of a provide chain assault in July 2025, CVE-2025-31125, an improper entry management vulnerability within the Vite frontend improvement framework, and CVE-2025-34026, an authentication bypass within the Versa Concerto SD-WAN orchestration platform.

Whereas BOD 22-01 applies solely to federal companies, all organizations are suggested to overview CISA’s KEV catalog and tackle the safety defects it identifies.

Associated: Recent SmarterMail Flaw Exploited for Admin Entry

Associated: CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries

Associated: Important HPE OneView Vulnerability Exploited in Assaults

Associated: Recent MongoDB Vulnerability Exploited in Assaults

Security Week News Tags:Collaboration, Exploited, Organizations, Vulnerability, Warned, Zimbra

Post navigation

Previous Post: Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
Next Post: Under Armour Looking Into Data Breach Affecting Customers’ Email Addresses

Related Posts

In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks Security Week News
Harvard Is First Confirmed Victim of Oracle EBS Zero-Day Hack Security Week News
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Security Week News
US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles Security Week News
South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation
  • Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems
  • Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware
  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation
  • Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems
  • Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware
  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark