CVE-2025-54390
Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in the ResetPasswordRequest operation of Zimbra Collaboration (ZCS) when the zimbraFeatureResetPasswordStatus attribute is enabled. An attacker can exploit this by tricking an authenticated user into visiting a malicious webpage that silently sends a crafted SOAP request to reset the user's password. The vulnerability stems from a lack of CSRF token validation on the endpoint, allowing password resets without the user's consent.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A CSRF vulnerability in Zimbra Collaboration's ResetPasswordRequest operation allows an attacker to reset an authenticated user's password without consent.
Vulnerability
Overview
A Cross-Site Request Forgery (CSRF) vulnerability exists in the ResetPasswordRequest operation of Zimbra Collaboration (ZCS) when the zimbraFeatureResetPasswordStatus attribute is enabled. The root cause is a lack of CSRF token validation on this endpoint, allowing an attacker to craft a malicious SOAP request that resets the victim's password without their knowledge or consent [1].
Exploitation
An attacker can exploit this vulnerability by tricking an authenticated Zimbra user into visiting a specially crafted webpage. This page silently sends a forged SOAP request to the Zimbra server, triggering a password reset. No additional authentication is required beyond the victim's active session, as the request is processed as if initiated by the legitimate user [1].
Impact
Successful exploitation allows the attacker to reset the victim's password, effectively gaining control of the user's account. This can lead to unauthorized access to emails, contacts, and other sensitive data stored in Zimbra Collaboration [1].
Mitigation
Zimbra has addressed this issue in ZCS 10.1.13 and 10.0.18, released on November 6, 2025, which include fixes for missing CSRF enforcement in specific authentication flows [1]. Users are strongly advised to upgrade to these or later versions. No workaround is mentioned in the available references.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.