The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-32354

CVE-2025-32354: Zimbra Collaboration Suite CSRF Vulnerability

CVE-2025-32354 is a Cross-Site Request Forgery flaw in Zimbra Collaboration Suite versions 9.0-10.1 that enables unauthorized GraphQL operations. This article covers technical details, affected versions, and mitigation.

Published: April 22, 2026

CVE-2025-32354 Overview

A Cross-Site Request Forgery (CSRF) vulnerability has been identified in Zimbra Collaboration (ZCS) versions 9.0 through 10.1. The vulnerability exists in the GraphQL endpoint (/service/extension/graphql) of Zimbra webmail due to a lack of CSRF token validation. This security flaw allows attackers to perform unauthorized GraphQL operations when an authenticated user visits a malicious website, potentially leading to contact modification, account setting changes, and access to sensitive user data.

Critical Impact

Attackers can execute unauthorized GraphQL operations on behalf of authenticated users, enabling data theft, account manipulation, and compromise of sensitive information without user consent.

Affected Products

  • Synacor Zimbra Collaboration Suite 9.0
  • Synacor Zimbra Collaboration Suite 10.0
  • Synacor Zimbra Collaboration Suite 10.1

Discovery Timeline

  • April 29, 2025 - CVE-2025-32354 published to NVD
  • June 11, 2025 - Last updated in NVD database

Technical Details for CVE-2025-32354

Vulnerability Analysis

This Cross-Site Request Forgery (CSRF) vulnerability stems from the absence of proper CSRF token validation on the GraphQL endpoint within Zimbra Collaboration Suite. The GraphQL API at /service/extension/graphql accepts and processes requests without verifying that they originate from legitimate user interactions within the Zimbra interface.

When an authenticated Zimbra user browses to a malicious website controlled by an attacker, that site can craft and submit GraphQL requests to the user's Zimbra instance. Because the browser automatically includes the user's session cookies with these requests, and the server fails to validate CSRF tokens, the malicious requests are processed as if they were legitimate user actions.

The attack requires user interaction (visiting a malicious page), but once triggered, can perform a wide range of operations including reading contacts, modifying account settings, and accessing other sensitive data stored within the collaboration suite.

Root Cause

The root cause of CVE-2025-32354 is the missing CSRF token validation mechanism on the GraphQL endpoint. Web applications that handle state-changing operations must implement anti-CSRF protections to ensure requests originate from the legitimate application interface. The Zimbra GraphQL endpoint failed to implement such validation, allowing cross-origin requests to be processed with the authenticated user's session context.

CWE-352 (Cross-Site Request Forgery) is the applicable weakness classification, as the vulnerable application does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

Attack Vector

The attack vector is network-based and requires user interaction. An attacker creates a malicious webpage containing embedded GraphQL requests targeting the Zimbra server. When an authenticated Zimbra user visits this page, their browser automatically includes authentication cookies with the forged requests. The Zimbra server processes these requests without CSRF validation, executing the attacker's operations with the victim's privileges.

Typical attack scenarios include:

The attacker hosts a webpage containing hidden forms or JavaScript that automatically submits GraphQL mutations to the Zimbra endpoint. These mutations can modify contacts, change account preferences, or query sensitive information. Since GraphQL supports batched queries, a single CSRF attack can perform multiple malicious operations simultaneously.

Detection Methods for CVE-2025-32354

Indicators of Compromise

  • Unexpected modifications to user contacts or address books
  • Unauthorized changes to account settings or preferences
  • Unusual GraphQL query patterns in webserver access logs targeting /service/extension/graphql
  • Cross-origin requests to the GraphQL endpoint from external domains in access logs

Detection Strategies

  • Monitor web server logs for requests to /service/extension/graphql with suspicious referrer headers from external domains
  • Implement web application firewall (WAF) rules to detect and alert on GraphQL requests originating from cross-origin sources
  • Review Zimbra audit logs for unexpected account setting modifications or contact changes that users did not initiate

Monitoring Recommendations

  • Enable detailed access logging for the GraphQL endpoint and review regularly for anomalous patterns
  • Configure alerts for high-volume GraphQL requests from individual user sessions
  • Implement network monitoring to detect outbound data exfiltration following potential CSRF exploitation

How to Mitigate CVE-2025-32354

Immediate Actions Required

  • Upgrade Zimbra Collaboration Suite to version 10.1.4 or later, which contains the security fix for this vulnerability
  • Review account activity and audit logs for signs of exploitation before patching
  • Implement network-level controls to restrict access to the Zimbra webmail interface from untrusted networks
  • Educate users about the risks of visiting untrusted websites while authenticated to Zimbra

Patch Information

Synacor has addressed this vulnerability in Zimbra 10.1.4 Security Fixes. Organizations should update to this version or later to receive the CSRF protection on the GraphQL endpoint. Additional security information and updates can be found at the Zimbra Security Center.

Workarounds

  • If immediate patching is not possible, consider restricting access to the GraphQL endpoint at the network or web server level
  • Implement a web application firewall (WAF) rule to validate Origin and Referer headers on requests to /service/extension/graphql
  • Configure SameSite cookie attributes to Strict for Zimbra session cookies to prevent cross-site request submission where browser support exists
  • Limit user access to external websites while authenticated to Zimbra through browser isolation or network proxy controls

For environments where immediate patching is not feasible, administrators can configure additional access controls at the reverse proxy or load balancer level to validate the origin of requests to the GraphQL endpoint. This provides a defense-in-depth measure while planning for the full upgrade.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeCSRF

  • Vendor/TechZimbra Collaboration Suite

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-352
  • Technical References
  • Zimbra 10.1.4 Security Fixes

  • Zimbra Responsible Disclosure Policy
  • Vendor Resources
  • Zimbra Security Center
  • Related CVEs
  • CVE-2025-66376: Zimbra Collaboration Suite XSS Vulnerability

  • CVE-2025-68645: Zimbra Collaboration Path Traversal Flaw

  • CVE-2022-24682: Zimbra Collaboration Suite XSS Vulnerability

  • CVE-2025-27915: Zimbra Collaboration Suite XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English