The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw in the Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog, confirming that the issue is being actively abused in real-world attacks. The agency has set an April 1, 2026 deadline for federal agencies and affected organizations to remediate the vulnerability, highlighting the urgency of addressing the risk.

It arises from insufficient sanitization of malicious content embedded in email messages. Attackers can exploit this weakness by inserting harmful scripts into emails, which are then executed when a user opens the message. Researchers found that threat actors are leveraging Cascading Style Sheets (CSS) @import directives within HTML email content to bypass existing filtering protections. When triggered, the malicious code runs within the context of the victim’s authenticated session. This allows attackers to access mailbox data, hijack sessions, and potentially expand their foothold within the broader collaboration environment Although there is no confirmed link to specific ransomware campaigns, CISA’s decision to include the flaw in the KEV catalog indicates active exploitation and a credible threat to organizations using the platform.

Zimbra vendor Synacor has released patches to address the issue. The fix involves upgrading the AntiSamy HTML sanitization library and removing legacy filtering components that contributed to the vulnerability. Organizations are advised to update to Zimbra Collaboration Suite version 10.1.13 for current deployments or version 10.0.18 for legacy systems as soon as possible For organizations unable to apply patches immediately, CISA recommends considering temporary discontinuation of the affected systems until proper mitigations are in place. While Synacor has assessed the deployment risk as moderate, administrators are encouraged to follow standard testing and validation procedures before rolling out updates in production environments.

In addition to fixing the vulnerability, the latest Zimbra updates introduce several improvements. These include enhanced TLS handling aligned with modern standards, better integration with Amazon S3 for data management, and upgrades to search functionality and recovery features. The Zimbra Connector for Outlook has also been updated to support Outlook , ensuring compatibility in enterprise settings.

However, organizations should note that Zimbra version 10.0 reached end-of-life at the end of 2025. While version 10.0.18 includes the necessary patch, it does not change the unsupported status of that branch. Users are strongly encouraged to migrate to the 10.1 series to ensure continued access to security updates With active exploitation confirmed and a strict remediation timeline in place, security experts stress that organizations must act quickly to patch vulnerable systems and plan long-term upgrades to reduce exposure to future threats.

Recommended Cyber News:

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com