Ad

CVE-2026-33373

HIGH CVSS 3.1: 8.8 EPSS 0.03%
Updated Apr 07, 2026
Synacor
Parameter Value
CVSS 8.8 (HIGH)
Affected Versions 10.0.0 — 10.1.13
Fixed In 10.0.18
Type CWE-352 (Cross-Site Request Forgery (CSRF))
Vendor Synacor
Public PoC No

An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A Cross-Site Request Forgery (CSRF) vulnerability exists in Zimbra Web Client due to the issuance of authentication tokens without CSRF protection during certain account state transitions. Specifically, tokens generated after operations such as enabling two-factor authentication or changing a password may lack CSRF enforcement.

While such a token is active, authenticated SOAP requests that trigger token generation or state changes can be performed without CSRF validation. An attacker could exploit this by inducing a victim to submit crafted requests, potentially allowing sensitive account actions such as disabling two-factor authentication. The issue is mitigated by ensuring CSRF protection is consistently enforced for all issued authentication tokens.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 2

Configuration From (including) Up to (excluding)
Synacor Zimbra_Collaboration_Suite
cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
10.0.0 10.0.18
Synacor Zimbra_Collaboration_Suite
cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
10.1.0 10.1.13