CVE-2017-20191
Description
A vulnerability was found in Zimbra zm-admin-ajax up to 8.8.1. It has been classified as problematic. This affects the function XFormItem.prototype.setError of the file WebRoot/js/ajax/dwt/xforms/XFormItem.js of the component Form Textbox Field Error Handler. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 8.8.2 is able to address this issue. The identifier of the patch is bb240ce0c71c01caabaa43eed30c78ba8d7d3591. It is recommended to upgrade the affected component. The identifier VDB-258621 was assigned to this vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in Zimbra zm-admin-ajax before 8.8.1 allows remote attackers to inject arbitrary web scripts via the textbox field error handler.
Root
Cause
The vulnerability resides in the function XFormItem.prototype.setError within the file WebRoot/js/ajax/dwt/xforms/XFormItem.js. The method directly assigns user-supplied input (message) to container.innerHTML without sanitization [2]. This means an attacker can control the error message shown on a form textbox, enabling cross-site scripting (XSS) [2].
Exploitation
To exploit this flaw, an attacker must craft a special request that triggers an error condition on a textbox field while passing a malicious payload in the message argument. No authentication is required if the affected component is exposed, as the attack can be initiated remotely [1]. Up to version 8.8.1, the error handler does not HTML-encode the message, allowing arbitrary script injection.
Impact
A successful exploit allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to data theft, session hijacking, or further malicious actions within the Zimbra admin interface.
Mitigation
The issue is fixed in version 8.8.2, where the commit bb240ce0c71c01caabaa43eed30c78ba8d7d3591 replaces the vulnerable assignment with AjxStringUtil.htmlEncode(message) [1][2]. Users are strongly advised to upgrade to version 8.8.2 or later to eliminate the XSS vector.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: 8.7.10, 8.7.11, 8.7.6, …
Patches
21f825a7dcd41bb240ce0c71cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.