CVE-2026-33369
Description
Zimbra Collaboration (ZCS) 10.0 and 10.1 contains an LDAP injection vulnerability in the Mailbox SOAP service within a FolderAction operation. The application fails to properly sanitize user-supplied input before incorporating it into an LDAP search filter. An authenticated attacker can exploit this issue by sending a crafted SOAP request that manipulates the LDAP query, allowing retrieval of sensitive directory attributes.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authenticated LDAP injection vulnerability in Zimbra Collaboration's Mailbox SOAP FolderAction operation allows retrieval of sensitive directory attributes.
Vulnerability
Overview
CVE-2026-33369 is an authenticated LDAP injection vulnerability found in Zimbra Collaboration (ZCS) versions 10.0 and 10.1. The flaw resides in the Mailbox SOAP service's FolderAction operation, where user-supplied input is not properly sanitized before being incorporated into an LDAP search filter. This allows an authenticated attackers to manipulate LDAP queries by sending a crafted SOAP request [1][2].
Exploitation
An attacker must first authenticate to the Zimbra system. Once authenticated, they can send a specially crafted SOAP request to the FolderAction endpoint. The lack of input sanitization enables the attacker to inject LDAP filter syntax, altering the intended query. This attack does not require administrative privileges, as it exploits a standard authenticated user's ability to interact with the FolderAction operation [1][2].
Impact
Successful exploitation allows the attacker to retrieve sensitive directory attributes from the LDAP backend. This could include information such as user account details, email addresses, or other directory entries that are normally protected. The vulnerability is rated Medium (CVSS 4.3) due to the requirement for authentication and the limited scope of information disclosure [1][2].
Mitigation
Zimbra has addressed this vulnerability in ZCS version 10.1.16, released on February 4, 2026. The fix involves sanitizing user-controlled input before incorporating user input into LDAP filters. Users are strongly advised to upgrade to version 10.1.16 or later. No workarounds have been published, and the vulnerability is not known to be exploited in the wild at the time of disclosure [2][3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*Range: >=10.0.0,<10.1.16
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- wiki.zimbra.com/wiki/Security_CenternvdVendor AdvisoryRelease Notes
- wiki.zimbra.com/wiki/Zimbra_Security_AdvisoriesnvdVendor Advisory
- wiki.zimbra.com/wiki/Zimbra_Releases/10.1.16nvdRelease Notes
- wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_PolicynvdProduct
News mentions
0No linked articles in our index yet.