PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-3408 Synacor CVE debrief

CVE-2016-3408 is a cross-site scripting (XSS) vulnerability in Zimbra Collaboration before 8.7.0. The published record says remote attackers could inject arbitrary web script or HTML via unspecified vectors, and NVD maps the issue to CWE-79 with a CVSS 3.0 score of 6.1 (network exploitable, no privileges required, but user interaction is needed). The affected-version data in NVD marks Zimbra Collaboration Suite versions up to 8.6.0 as vulnerable, with 8.7.0 identified in the supplied vendor references as the relevant release boundary.

Vendor
Synacor
Product
CVE-2016-3408
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-18
Original CVE updated
2026-05-13
Advisory published
2017-01-18
Advisory updated
2026-05-13

Who should care

Zimbra Collaboration administrators, especially teams running version 8.6.0 or earlier and any internet-facing webmail deployments.

Technical summary

The vulnerability is a web-based XSS condition in Zimbra Collaboration (CWE-79). NVD lists the affected CPE range as Zimbra Collaboration Suite versions through 8.6.0, and the CVSS vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates a remotely reachable issue that does not require authentication but does require user interaction. The source corpus does not provide a more specific injection path, so the exact affected workflow should be validated against the vendor advisory and release notes linked in the record.

Defensive priority

Medium priority. Patch promptly if Zimbra is exposed to end users or external traffic, because XSS can affect browser sessions and content integrity even when the attack path is user-driven. The most direct risk reduction is upgrading to the fixed release and hardening any custom web content handling.

Recommended defensive actions

  • Upgrade Zimbra Collaboration to 8.7.0 or later, since the supplied references identify 8.7.0 as the relevant fixed-release boundary and NVD marks 8.6.0 and earlier as vulnerable.
  • Review Zimbra-facing web content paths for unsafe HTML rendering and ensure user-controlled input is encoded or sanitized before display.
  • Validate any custom themes, templates, extensions, or integrations that render mail or web UI content, because XSS often appears in application-specific presentation layers.
  • Harden administrator and user browser sessions with security controls such as content filtering and restrictive browser policies to reduce the impact of script injection.
  • Monitor for unusual client-side behavior or reports of unexpected script execution in Zimbra pages, and treat those as indicators to investigate affected content or accounts.

Evidence notes

Primary evidence comes from the supplied NVD record and CVE metadata: the description names XSS in Zimbra Collaboration before 8.7.0, and the NVD entry assigns CVSS 3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N with CWE-79. The NVD CPE criteria in the supplied source mark Zimbra Collaboration Suite through version 8.6.0 as vulnerable. The record also includes official vendor links to Zimbra 8.7.0 release notes and the Zimbra security advisories page. The CVE was published in the supplied record on 2017-01-18 and last modified on 2026-05-13; those dates are publication metadata, not the exploitation date.

Official resources

Published in the supplied record on 2017-01-18T22:59:00.420Z.