CVE-2023-37580

Zimbra ZCS 8.8.x — Reflected XSS via Unescaped URL Parameter Exploited by Four Nation-State Groups as Zero-Day
⚠️ CVSS 3.1  6.1 / 10 — MEDIUM 🔴 CISA Known Exploited Vulnerability

What is Zimbra Collaboration Suite?

Zimbra Collaboration Suite (ZCS) is an enterprise email, calendar, and collaboration platform deployed globally across government agencies, diplomatic missions, military organisations, and enterprises. Its Classic Web Client is a browser-based webmail interface that processes incoming messages, including URL parameters used for navigation and request routing. CVE-2023-37580 exposes one such parameter — the st parameter — as a reflected XSS injection point, allowing an attacker to craft a malicious URL that, when clicked, executes JavaScript in the context of the victim's authenticated Zimbra session.

Overview

Actively Exploited — Four Nation-State Groups. CVE-2023-37580 has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog on July 27, 2023. Google's Threat Analysis Group (TAG) documented four independent nation-state groups exploiting this vulnerability across a ten-week zero-day and post-patch exploitation window — one of the most extensively documented cases of email platform XSS exploitation by state-sponsored actors on record.

CVE-2023-37580 is a reflected cross-site scripting (XSS) vulnerability in Zimbra Collaboration Suite 8 prior to 8.8.15 Patch 41. A URL parameter in the Classic Web Client is injected directly into the HTML page without escaping, allowing an attacker to craft a malicious Zimbra URL that executes JavaScript in the victim's authenticated session when clicked. The attack is delivered via email or any other vector that can place a crafted URL in front of the target.

Affected Versions

Status Zimbra ZCS Version
Vulnerable ZCS 8 (all 8.x versions) prior to 8.8.15 Patch 41
Fixed ZCS 8.8.15 Patch 41 and later
Note CVE-2023-37580 only affects the 8.8.x release train

Technical Details

The vulnerability is in the Classic Web Client URL routing logic. The st URL parameter — used to specify a state or navigation target within the webmail interface — is embedded directly into the HTML of the rendered page without HTML-entity encoding. An attacker crafts a URL containing JavaScript in the st parameter; when a victim clicks the link and the Classic Web Client renders the page, the script executes in the context of the victim's authenticated session.

Example of the injection mechanism (simplified):

https://zimbra-server/zimbra/?st=<script>/* attacker payload */</script>

The st parameter's value is reflected back into the response without sanitization, triggering execution.

Attack characteristics:

  • Authentication required: No — the attacker sends a crafted URL; no prior access to Zimbra is needed
  • User interaction: Required — victim must click the malicious Zimbra link
  • Delivery method: Spear-phishing email containing a link to the victim's own Zimbra server
  • Execution context: Victim's authenticated Zimbra session — attacker script accesses session cookies, email data, contacts, and authentication tokens
  • Scope: Changed — the exploit runs in a different security context (the victim's browser session) than the attacker's origin

What the fix does: Zimbra's patch escapes the contents of the st parameter before injecting it into the HTML response, preventing script execution. The fix was committed to the public Zimbra GitHub repository before an official advisory was issued — making the vulnerability's technical details visible to threat actors monitoring the repository.

Discovery

CVE-2023-37580 was discovered and reported by Clément Lecigne of Google's Threat Analysis Group (TAG). Google TAG identified the vulnerability after observing exploitation in the wild during their ongoing monitoring of government-targeting campaigns. Google TAG published a public analysis of the four exploitation campaigns in November 2023, providing the most comprehensive public attribution of XSS exploitation against government webmail servers on record.

Exploitation Context

Google TAG documented four separate nation-state exploitation campaigns using CVE-2023-37580 across a ten-week period from late June to late August 2023. Three of the four campaigns began before the official Zimbra patch was released on July 25, 2023 — the initial campaigns exploited the vulnerability as a zero-day. The fourth campaign, attributed to a Pakistan-linked group, began after the patch was public, indicating that post-patch exploitation continued as organisations delayed updating.

Campaign Timing Attribution Target
Greece-linked group June 29, 2023 (zero-day) Google TAG Greek government officials' webmail
Winter Vivern / UAC-0114 July 2023 (before patch) Google TAG Moldova and Tunisia government webmail
Vietnam-nexus group July 20, 2023 (before patch) Google TAG Government targets
Pakistan-nexus group August 25, 2023 (after patch) Google TAG Exfiltrated Zimbra auth tokens to ntcpk[.]org

Winter Vivern (UAC-0114) is a threat actor attributed by multiple security firms to Belarusian intelligence services. It had previously targeted Ukrainian, Polish, and European government entities. CVE-2023-37580 represented an expansion to Moldova and Tunisia — specifically targeting government webmail accounts likely held by foreign ministry and diplomatic personnel.

A critical observation from Google TAG: "Most of this activity occurred after the initial fix became public on GitHub." The fix was merged to the public Zimbra GitHub repository before the official security advisory was published — making the vulnerability's existence and the patch's intent visible to any attacker monitoring the repository. Three independent groups were exploiting the zero-day when the fix appeared on GitHub; the fourth group appears to have picked it up after seeing the public fix. This demonstrates the importance of coordinated disclosure and the risk of publishing patches without simultaneous security advisories.

Remediation

  1. Upgrade to ZCS 8.8.15 Patch 41 or later immediately. The fix is a single-parameter escaping change; upgrading is the only durable mitigation.
  2. Warn users about phishing emails containing Zimbra webmail links from external sources. Reflected XSS requires the victim to click a crafted URL — user awareness is a secondary layer of defense.
  3. Monitor for anomalous authenticated webmail activity following receipt of emails containing links to the Zimbra server itself. Look for unexpected API calls, session events from unexpected source IPs, or email filter rules created shortly after clicking an internal-looking link.
  4. Review and invalidate active sessions on the server post-patch if the exploitation window may have overlapped with active sessions. Unexpired sessions may still be usable by attacker-held stolen cookies.
  5. Consider migrating to the Modern UI (Iris) for high-value users — all confirmed exploitation of CVE-2023-37580 targeted the Classic Web Client.

Key Details

PropertyValue
CVE ID CVE-2023-37580
Vendor / Product Synacor — Zimbra Collaboration Suite (ZCS)
NVD Published2023-07-31
NVD Last Modified2025-10-31
CVSS 3.1 Score6.1
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
SeverityMEDIUM
CWE CWE-79 — Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CISA KEV Added2023-07-27
CISA KEV Deadline2023-08-17
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Required Action

CISA BOD 22-01 Deadline: 2023-08-17. Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2023-06-29First exploitation observed — Greece-linked group exploits CVE-2023-37580 as a zero-day against Greek government officials' Zimbra webmail accounts
2023-07-01Zimbra fix committed to public GitHub repository (fix visible before official advisory)
2023-07-01Winter Vivern (UAC-0114) begins exploiting the vulnerability — before official patch — targeting Moldova and Tunisia government webmail
2023-07-20Vietnam-nexus threat group begins exploitation
2023-07-25Zimbra releases official patch: ZCS 8.8.15 Patch 41
2023-07-27Added to CISA Known Exploited Vulnerabilities catalog (two days after official patch, three of four campaigns already active)
2023-08-17CISA BOD 22-01 remediation deadline
2023-08-25Pakistan-nexus group exploits vulnerability (post-patch); exfiltrates Zimbra authentication tokens to 'ntcpk[.]org'
2023-11-01Google TAG publishes public analysis documenting all four nation-state exploitation campaigns