CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog
Summary
Hide ▲
Show ▼
CISA added the stored cross-site scripting (XSS) vulnerability CVE-2025-66376 in Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog on March 18, 2026. The flaw, patched in early November 2025, allows unauthenticated attackers to execute arbitrary JavaScript via malicious HTML emails, enabling session hijacking and data theft in compromised Zimbra environments. CISA ordered U.S. federal agencies to patch the flaw by April 1, 2026 under BOD 22-01 and encouraged all organizations to apply mitigations promptly. Russian state-sponsored threat group APT28 (Fancy Bear, Strontium), linked to Russia's military intelligence service (GRU), is actively exploiting CVE-2025-66376 in attacks targeting Ukrainian government entities, including the Ukrainian State Hydrology Agency, as part of a phishing campaign codenamed Operation GhostMail. The attack chain relies on malicious HTML email bodies with obfuscated JavaScript payloads that execute silently in vulnerable Zimbra webmail sessions to harvest credentials, session tokens, 2FA codes, saved passwords, and mailbox contents dating back 90 days, with data exfiltrated over DNS and HTTPS. This exploitation follows prior Russian campaigns against Zimbra infrastructure, including operations by Winter Vivern (since February 2023) and APT29 (Cozy Bear, Midnight Blizzard) in October 2024.
Timeline
-
23.01.2026 17:24 4 articles · 1mo ago
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog
CISA added CVE-2025-66376 to its KEV catalog on March 18, 2026, designating it as a stored XSS flaw in Zimbra Collaboration Suite (ZCS) Classic UI allowing remote unauthenticated attackers to execute arbitrary JavaScript via malicious HTML emails, enabling session hijacking and data theft. The vulnerability, patched in early November 2025, is being actively exploited in the wild by Russian state-sponsored actors such as APT28 (Fancy Bear) in attacks targeting Ukrainian government entities, including the Ukrainian State Hydrology Agency. CISA ordered U.S. federal agencies to patch the flaw by April 1, 2026 under BOD 22-01 and encouraged all organizations to apply mitigations promptly. Exploitation involves silent JavaScript payloads in email bodies that harvest credentials, tokens, and mailbox contents, with data exfiltrated over DNS and HTTPS.
Show sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
Information Snippets
-
CVE-2025-68645 (CVSS score: 8.8) is a PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that allows remote attackers to include arbitrary files without authentication.
First reported: 23.01.2026 17:242 sources, 2 articlesShow sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
CVE-2025-34026 (CVSS score: 9.2) is an authentication bypass in Versa Concerto SD-WAN orchestration platform that allows attackers to access administrative endpoints.
First reported: 23.01.2026 17:242 sources, 2 articlesShow sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
CVE-2025-31125 (CVSS score: 5.3) is an improper access control vulnerability in Vite Vitejs that allows contents of arbitrary files to be returned to the browser.
First reported: 23.01.2026 17:242 sources, 2 articlesShow sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
CVE-2025-54313 (CVSS score: 7.5) is an embedded malicious code vulnerability in eslint-config-prettier that allows execution of a malicious DLL named Scavenger Loader.
First reported: 23.01.2026 17:242 sources, 2 articlesShow sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
CVE-2025-54313 is part of a supply chain attack targeting multiple npm packages, including eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall, got-fetch, and is.
First reported: 23.01.2026 17:242 sources, 2 articlesShow sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
The phishing campaign targeted package maintainers with bogus links to harvest their credentials, allowing threat actors to publish trojanized versions of the packages.
First reported: 23.01.2026 17:242 sources, 2 articlesShow sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
Exploitation of CVE-2025-68645 has been ongoing since January 14, 2026, according to CrowdSec.
First reported: 23.01.2026 17:242 sources, 2 articlesShow sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
Federal agencies must apply patches for these vulnerabilities by February 12, 2026, as per Binding Operational Directive (BOD) 22-01.
First reported: 23.01.2026 17:242 sources, 2 articlesShow sources
- CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities — thehackernews.com — 23.01.2026 17:24
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
CVE-2025-31125 affects only exposed dev instances and has been patched in versions 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
First reported: 23.01.2026 20:471 source, 1 articleShow sources
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
CVE-2025-34026 is caused by a Traefik reverse proxy misconfiguration that allows access to administrative endpoints, including the internal Actuator endpoint, exposing heap dumps and trace logs.
First reported: 23.01.2026 20:471 source, 1 articleShow sources
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
Affected products for CVE-2025-34026 are Concerto 12.1.2 through 12.2.0, although additional versions may also be impacted.
First reported: 23.01.2026 20:471 source, 1 articleShow sources
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
Researchers at cybersecurity company ProjectDiscovery reported the issues to the vendor on February 13, 2025, and Versa Concerto confirmed to BleepingComputer that they had fixed them on March 7, 2025.
First reported: 23.01.2026 20:471 source, 1 articleShow sources
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
Installing an affected package (versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7) for CVE-2025-54313 would run a malicious install.js script that launched the node-gyp.dll payload on Windows to steal npm authentication tokens.
First reported: 23.01.2026 20:471 source, 1 articleShow sources
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
CVE-2025-68645 is a local file inclusion vulnerability in the Webmail Classic UI of Zimbra Collaboration Suite 10.0 and 10.1 caused by improper handling of user-supplied parameters in the RestFilter servlet.
First reported: 23.01.2026 20:471 source, 1 articleShow sources
- CISA confirms active exploitation of four enterprise software bugs — www.bleepingcomputer.com — 23.01.2026 20:47
-
CVE-2025-66376 is a stored cross-site scripting (XSS) vulnerability in Zimbra Collaboration Suite (ZCS) Classic UI that allows remote unauthenticated attackers to exploit CSS @import directives in email HTML to execute arbitrary JavaScript
First reported: 18.03.2026 21:571 source, 2 articlesShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
CVE-2025-66376 was patched in early November 2025
First reported: 18.03.2026 21:571 source, 2 articlesShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
CISA added CVE-2025-66376 to its KEV catalog on March 18, 2026
First reported: 18.03.2026 21:571 source, 2 articlesShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
CISA ordered U.S. federal agencies to patch CVE-2025-66376 by April 1, 2026 under BOD 22-01
First reported: 18.03.2026 21:571 source, 2 articlesShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
CVE-2025-66376 is being actively exploited in the wild by threat actors
First reported: 18.03.2026 21:571 source, 2 articlesShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
Zimbra Collaboration Suite is widely used by hundreds of millions of people and thousands of businesses and government agencies globally
First reported: 18.03.2026 21:571 source, 1 articleShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
-
CVE-2025-66376 likely enables session hijacking and data theft within compromised Zimbra environments
First reported: 18.03.2026 21:571 source, 2 articlesShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
Zimbra servers have been frequent targets of attacks, including exploitation by Russian state-backed Winter Vivern group using reflected XSS vulnerabilities
First reported: 18.03.2026 21:571 source, 1 articleShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
-
CISA encouraged all organizations, not just federal agencies, to patch CVE-2025-66376 promptly
First reported: 18.03.2026 21:571 source, 2 articlesShow sources
- CISA orders feds to patch Zimbra XSS flaw exploited in attacks — www.bleepingcomputer.com — 18.03.2026 21:57
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
APT28 (Fancy Bear, Strontium), a Russian GRU-linked state-sponsored threat group, is exploiting CVE-2025-66376 to target Ukrainian government entities
First reported: 19.03.2026 16:551 source, 1 articleShow sources
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
The vulnerability enables remote code execution (RCE) and compromise of Zimbra servers and email accounts when exploited via malicious HTML email bodies
First reported: 19.03.2026 16:551 source, 1 articleShow sources
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
Seqrite Labs reported the exploitation by APT28 in attacks against Ukraine, including the Ukrainian State Hydrology Agency, as part of Operation GhostMail
First reported: 19.03.2026 16:551 source, 1 articleShow sources
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
The phishing emails contained no attachments or links; the malicious JavaScript payload executed silently in the browser to harvest credentials, session tokens, 2FA codes, saved passwords, and mailbox contents going back 90 days
First reported: 19.03.2026 16:551 source, 1 articleShow sources
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
Exfiltration of stolen data occurred over both DNS and HTTPS protocols
First reported: 19.03.2026 16:551 source, 1 articleShow sources
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
-
Zimbra has been frequently targeted by Russian state-sponsored groups, including Winter Vivern (since February 2023) and APT29 (Cozy Bear) in October 2024
First reported: 19.03.2026 16:551 source, 1 articleShow sources
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks — www.bleepingcomputer.com — 19.03.2026 16:55
Similar Happenings
Interlock ransomware leverages Cisco FMC insecure deserialization zero-day (CVE-2026-20131) for root access
A critical insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2026-20131 (CVSS 10.0), is being actively exploited by the Interlock ransomware group to gain unauthenticated remote root access on unpatched systems. The flaw enables unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges via crafted HTTP requests to a specific endpoint. Exploitation has been observed as a zero-day since January 26, 2026, more than a month before public disclosure and patch availability. The attack chain includes post-exploitation tooling such as custom JavaScript/Java RATs, PowerShell reconnaissance scripts, Linux reverse proxy configuration tools, memory-resident web shells, and ConnectWise ScreenConnect for persistence. Compromised environments are being leveraged for ransomware operations and secondary monetization.
Two Actively Exploited Roundcube Vulnerabilities Added to CISA KEV Catalog
CISA added two vulnerabilities in Roundcube webmail software to its KEV catalog, citing active exploitation. CVE-2025-49113 (CVSS 9.9) allows remote code execution via untrusted data deserialization, while CVE-2025-68461 (CVSS 7.2) is a cross-site scripting flaw. Both vulnerabilities were patched in 2025, but exploits have been developed and sold. The flaws have been linked to nation-state actors in the past. FCEB agencies must remediate by March 13, 2026. Over 84,000 vulnerable Roundcube webmail installations were identified shortly after the patch for CVE-2025-49113 was released, and CVE-2025-68461 can be exploited through low-complexity XSS attacks abusing the animate tag in SVG documents.
Critical Pre-Auth RCE Vulnerability in BeyondTrust Remote Support and PRA
BeyondTrust has patched a critical pre-authentication remote code execution (RCE) vulnerability (CVE-2026-1731, CVSS 9.9) in Remote Support (RS) and Privileged Remote Access (PRA) products. The flaw could allow unauthenticated attackers to execute OS commands in the context of the site user, leading to unauthorized access, data exfiltration, and service disruption. The vulnerability affects RS versions 25.3.1 and prior, and PRA versions 24.3.4 and prior. Patches are available in RS versions 25.3.2 and later, and PRA versions 25.1.1 and later. Self-hosted customers must manually apply updates if not subscribed to automatic updates. The vulnerability was discovered on January 31, 2026, with approximately 11,000 exposed instances identified, including around 8,500 on-prem deployments. BeyondTrust secured all RS/PRA cloud systems by February 2, 2026. The flaw was discovered by Harsh Jaiswal and the Hacktron AI team. Threat actors can exploit the flaw through maliciously crafted client requests in low-complexity attacks that do not require user interaction. In June 2025, BeyondTrust fixed a high-severity RS/PRA Server-Side Template Injection vulnerability. Attackers have begun actively exploiting the CVE-2026-1731 vulnerability in the wild, abusing the get_portal_info endpoint to extract the x-ns-company value before establishing a WebSocket channel. A proof-of-concept exploit targeting the /get_portal_info endpoint was published on GitHub. Threat actors have been observed exploiting CVE-2026-1731 to conduct network reconnaissance, deploy web shells, establish command-and-control (C2) channels, install backdoors and remote management tools, perform lateral movement, and exfiltrate data. The attacks have targeted financial services, legal services, high technology, higher education, wholesale and retail, and healthcare sectors across the U.S., France, Germany, Australia, and Canada. The vulnerability enables attackers to inject and execute arbitrary shell commands via the affected 'thin-scc-wrapper' script through the WebSocket interface. Attackers have deployed multiple web shells, including a PHP backdoor and a bash dropper, to maintain persistent access. Malware such as VShell and Spark RAT have been deployed as part of the exploitation. Out-of-band application security testing (OAST) techniques have been used to validate successful code execution and fingerprint compromised systems. Sensitive data, including configuration files, internal system databases, and a full PostgreSQL dump, have been exfiltrated to an external server. CVE-2026-1731 and CVE-2024-12356 share a common issue with input validation within distinct execution pathways. CVE-2026-1731 could be a target for sophisticated threat actors, similar to CVE-2024-12356 which was exploited by China-nexus threat actors like Silk Typhoon. CISA has confirmed that CVE-2026-1731 has been exploited in ransomware campaigns. CISA added CVE-2026-1731 to its Known Exploited Vulnerabilities (KEV) catalog on February 13 and gave federal agencies three days to apply the patch or stop using the product. Proof-of-concept (PoC) exploits for CVE-2026-1731 became available shortly after the initial disclosure, and exploitation was detected on January 31, making it a zero-day vulnerability for at least a week. CISA has activated the 'Known To Be Used in Ransomware Campaigns?' indicator in the KEV catalog for CVE-2026-1731. Customers of the cloud-based application (SaaS) had the patch applied automatically on February 2. Self-hosted instance customers need to either enable automatic updates or manually install the patch. For Remote Support, the recommended version is 25.3.2. For Privileged Remote Access, the recommended version is 25.1.1 or newer. Customers still using RS v21.3 and PRA v22.1 are recommended to upgrade to a newer version before applying the patch.
Microsoft January 2026 Patch Tuesday Addresses 3 Zero-Days, 114 Flaws
Microsoft's January 2026 Patch Tuesday addressed 114 vulnerabilities, including three zero-days: one actively exploited (CVE-2026-20805) and two publicly disclosed (CVE-2026-21265 and CVE-2023-31096). The updates covered a range of flaw types, with eight classified as 'Critical,' including remote code execution and elevation-of-privilege vulnerabilities. Additionally, Microsoft released emergency out-of-band security updates to patch a high-severity Microsoft Office zero-day vulnerability (CVE-2026-21509) exploited in attacks, affecting multiple Office versions. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20805 and CVE-2026-21509 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to apply the latest fixes by February 3, 2026, and February 16, 2026, respectively. The flaw was discovered by the Microsoft Threat Intelligence Center (MSTIC), the Microsoft Security Response Center (MSRC), and the Office Product Group Security Team, and affects several versions of Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps for Enterprise.
Active Exploitation of Unpatched Cisco AsyncOS Zero-Day in SEG and SEWM Appliances
Cisco has identified an unpatched, critical zero-day vulnerability (CVE-2025-20393) in AsyncOS, affecting Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances. The flaw is actively exploited by a Chinese threat group, UAT-9686, to deploy backdoors and other malware. The attacks have been ongoing since at least late November 2025. Cisco has released security updates for the vulnerability and recommends securing and restricting access to vulnerable appliances. The vulnerability allows threat actors to execute arbitrary commands with root privileges and deploy tools like AquaShell, AquaTunnel, Chisel, and AquaPurge. CISA has added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) catalog, requiring FCEB agencies to apply mitigations by December 24, 2025. Additionally, GreyNoise detected a coordinated campaign targeting enterprise VPN infrastructure, including Cisco SSL VPN and Palo Alto Networks GlobalProtect portals.