CVE-2025-68645

HIGH CISA KEV

CVSS v3

8.8

HIGH

EPSS Score

31.4%

exploit probability

CISA KEV

Yes

known exploited

Exploitation

SSVC status

Description

A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.

CISA Known Exploited Vulnerability

Date Added
1/22/2026
Patch Due Date
2/12/2026
Required Action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Technical Details

CVSS v3 Vector
3.1
Published
12/22/2025
Last Modified
1/23/2026

Frequently Asked Questions

What is CVE-2025-68645?

A Local File Inclusion (LFI) vulnerability exists in the Webmail Classic UI of Zimbra Collaboration (ZCS) 10.0 and 10.1 because of improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can craft requests to the /h/rest endpoint to influence internal request dispatching, allowing inclusion of arbitrary files from the WebRoot directory.

Is CVE-2025-68645 actively exploited?

Yes. CVE-2025-68645 is on the CISA Known Exploited Vulnerabilities (KEV) catalog, meaning it has been confirmed as actively exploited in the wild. CISA requires federal agencies to patch by 2/12/2026.

What is the CVSS score for CVE-2025-68645?

CVE-2025-68645 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.

Is CVE-2025-68645 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.

CVE-2025-68645 Vulnerability — CVSS 8.8, HIGH Severity | isMalicious