CVE-2025-54391 Overview
A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zimbra Collaboration (ZCS) allows an attacker with valid user credentials to bypass Two-Factor Authentication (2FA) protection. The attacker can configure an additional 2FA method (either a third-party authenticator app or email-based 2FA) without presenting a valid authentication token or proving access to an already configured 2FA method. This bypasses 2FA and results in unauthorized access to accounts that are otherwise protected by 2FA.
Critical Impact
Attackers with compromised credentials can completely bypass 2FA protections, gaining unauthorized access to accounts that should be secured by multi-factor authentication.
Affected Products
- Zimbra Collaboration (ZCS) - Specific affected versions not disclosed in advisory
- Zimbra SOAP API Endpoints
- Zimbra Two-Factor Authentication Module
Discovery Timeline
- 2025-09-16 - CVE-2025-54391 published to NVD
- 2025-09-17 - Last updated in NVD database
Technical Details for CVE-2025-54391
Vulnerability Analysis
This vulnerability represents a significant authentication bypass flaw in Zimbra Collaboration's Two-Factor Authentication implementation. The core issue resides in the EnableTwoFactorAuthRequest SOAP endpoint, which fails to properly validate whether a user has already authenticated with their existing 2FA method before allowing them to configure a new one.
The weakness is classified under CWE-284 (Improper Access Control), indicating that the endpoint does not adequately verify that the requesting entity has the proper authorization to perform 2FA configuration changes. In a properly secured implementation, modifying 2FA settings should require proof of access to an existing 2FA method or an authenticated session token that confirms multi-factor authentication has been completed.
Root Cause
The root cause is improper access control in the EnableTwoFactorAuthRequest SOAP endpoint. The endpoint accepts requests to configure additional 2FA methods without requiring:
- A valid authentication token proving the user has completed existing 2FA verification
- Verification of access to any previously configured 2FA method
- Proper session state validation confirming multi-factor authentication status
This allows an attacker who possesses only the first factor (username and password) to add their own 2FA method to the account, effectively circumventing the security control that 2FA is designed to provide.
Attack Vector
The attack is network-based and requires an attacker to have obtained valid user credentials through methods such as phishing, credential stuffing, or password database breaches. Once the attacker has the first authentication factor, they can exploit this vulnerability by:
- Authenticating with the stolen username and password to the Zimbra server
- Sending a crafted SOAP request to the EnableTwoFactorAuthRequest endpoint
- Configuring their own authenticator app or email address as a new 2FA method
- Using their newly configured 2FA method to complete authentication and gain full account access
The vulnerability affects accounts that would otherwise be protected by 2FA, as the attacker can add and use their own 2FA configuration without needing access to the legitimate user's authenticator device or email.
Detection Methods for CVE-2025-54391
Indicators of Compromise
- Unexpected 2FA method additions or modifications in Zimbra user accounts
- SOAP requests to EnableTwoFactorAuthRequest endpoint from unusual IP addresses or geographic locations
- Multiple 2FA configuration changes on accounts following single-factor authentication
- User reports of unauthorized 2FA devices added to their accounts
Detection Strategies
- Monitor SOAP API logs for requests to the EnableTwoFactorAuthRequest endpoint and correlate with authentication events
- Implement alerting for 2FA configuration changes that occur without corresponding successful 2FA verification events
- Deploy behavioral analytics to detect credential-only authentication followed by immediate 2FA configuration changes
- Review Zimbra audit logs for patterns of 2FA manipulation activity
Monitoring Recommendations
- Enable comprehensive logging for all SOAP endpoint activity in Zimbra Collaboration
- Configure SIEM rules to alert on 2FA configuration changes from new IP addresses or devices
- Implement user notification workflows for any 2FA method additions or modifications
- Establish baseline metrics for normal 2FA configuration activity to identify anomalies
How to Mitigate CVE-2025-54391
Immediate Actions Required
- Review Zimbra Security Advisories for official patches and apply them immediately
- Audit all user accounts for unauthorized 2FA method additions
- Implement network-level access controls to restrict access to SOAP endpoints from untrusted networks
- Consider temporarily disabling the ability to add new 2FA methods until patches are applied
Patch Information
Consult the Zimbra Security Center for the latest security patches and updates addressing this vulnerability. Organizations should follow Zimbra's official guidance for applying security updates to their ZCS deployments.
Workarounds
- Restrict access to the EnableTwoFactorAuthRequest SOAP endpoint at the network or web application firewall level
- Implement additional authentication requirements for 2FA configuration changes through custom policy enforcement
- Enable enhanced audit logging and real-time alerting for 2FA-related API calls
- Consider implementing IP allowlisting for administrative functions including 2FA management
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

