Cyber Threat Brief — April 22 2026

⚠️ This report is AI-generated. Always validate findings.

1. Zimbra Classic UI Stored XSS — CVE-2025-48700

TL;DR: CISA KEV addition April 20 with April 23 federal deadline (TOMORROW). Stored XSS in Zimbra Classic UI exploited by UAC-0233 against Ukrainian entities since September 2025 — viewing a crafted email triggers JavaScript execution with zero additional interaction, enabling session hijack, 2FA backup code theft, and mailbox exfiltration.

What’s New:

  • CISA KEV addition April 20; FCEB remediation deadline April 23
  • CERT-UA attributes exploitation to UAC-0233 targeting Ukrainian state entities since September 2025
  • Post-exploitation: mailbox contents compiled into TGZ archive, MFA backup codes harvested, application passwords stolen, global address book exfiltrated
  • CSS @import directive bypass defeats HTML sanitization in Classic UI; crafted tag structures + attribute values inject arbitrary JS
  • Affects ZCS 8.8.15, 9.0, 10.0, 10.1; patched in ZCS 10.0.18 / 10.1.13 (November 6, 2025)

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
Emails with CSS @import directives in HTML bodyExploit payloadT1189Zimbra /opt/zimbra/log/mailbox.log, mail gateway logsHunt — inbound emails containing @import in HTML attributes
Session cookie theft via injected JavaScriptSession hijackT1539Zimbra audit log /opt/zimbra/log/audit.logHunt — session reuse from different source IPs
TGZ archive creation from mailbox contentsData stagingT1560.001Zimbra mailbox.log, filesystem monitoringAlert — bulk mailbox export operations
MFA backup code / app password accessCredential accessT1556Zimbra admin audit logsHunt — MFA settings access followed by auth from new IP
Global address book exportCollectionT1087.003Zimbra audit.logHunt — GAL export requests from non-admin sessions

Detection

SourceRuleGap
Splunk ESCUWeb JSP Request via URL (generic, partial)No Zimbra Classic UI XSS-specific rule; need CSS @import payload detection in email content
ElasticNoneNeed: Zimbra audit log session anomaly detection (IP change mid-session)
SigmaNoneNeed: Zimbra mailbox bulk export and GAL access anomaly rules

Sources: CISA KEV April 20 · NVD · HackerNews · CyberExpress


Status Updates

  • CVE-2023-27351 (PaperCut NG/MF): CISA KEV addition April 20; legacy 2023 auth bypass (CVSS 8.2) resurging in exploitation; Cl0p/LockBit ransomware attribution; federal deadline May 4; confirm patched to NG/MF 22.0.6+. CISA KEV.
  • CVE-2024-27199 (JetBrains TeamCity): CISA KEV addition April 20; legacy 2024 path traversal (CVSS 7.3) with active exploitation; enables limited admin actions including HTTPS cert replacement; federal deadline May 4; confirm patched to TeamCity 2023.11.4+. Splunk blog.
  • CVE-2026-20127/20122/20128/20133 (Cisco SD-WAN): Federal deadline TOMORROW April 23 for three companion CVEs added April 20; full SD-WAN Manager attack chain documented. Original brief April 5.
  • BlueHammer/RedSun/UnDefend (Microsoft Defender): All three ITW per Huntress; no new artifacts since April 20 IOC update. Original brief April 7.
  • CVE-2026-4681 (PTC Windchill): Still no patch; German police physical outreach continues. Original brief March 27.