Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware
CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware
NEWS

CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware

CISA added actively exploited Zimbra Collaboration Suite and Microsoft SharePoint vulnerabilities to its Known Exploited Vulnerabilities catalog on March...

Dylan H.

News Desk

March 19, 2026
7 min read

CISA Flags Three Critical Exploited Flaws Across Email, SharePoint, and Network Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a triple-threat advisory on March 18, 2026, warning federal agencies and critical infrastructure operators of active exploitation across three widely deployed platforms. Two vulnerabilities — one in Synacor Zimbra Collaboration Suite (ZCS) and one in Microsoft Office SharePoint — were added to CISA's Known Exploited Vulnerabilities (KEV) catalog, while a maximum-severity zero-day in Cisco Secure Firewall Management Center was simultaneously confirmed as the vector used by the Interlock ransomware gang in attacks dating back to January 26, 2026.

The advisories were first reported by The Hacker News on March 19, 2026.


CISA KEV Additions — March 18, 2026

CVEProductSeverityTypeKEV AddedFCEB Deadline
CVE-2025-66376Zimbra Collaboration Suite 10.xMedium–HighStored XSSMarch 18, 2026April 1, 2026
CVE-2026-20963Microsoft SharePoint Server8.8 HighDeserialization RCEMarch 18, 2026March 21, 2026 (URGENT)

Note: The March 21 deadline for CVE-2026-20963 gives Federal Civilian Executive Branch (FCEB) agencies only 3 days to patch — reflecting CISA's assessment of the severity and active exploitation risk.


CVE-2025-66376: Zimbra Collaboration Suite Stored XSS

Overview

A stored cross-site scripting (XSS) vulnerability in Zimbra Collaboration Suite (ZCS) Classic UI allows attackers to embed malicious JavaScript via CSS @import directives in HTML email messages. When a victim opens or previews the crafted email, the script executes in their browser session — enabling session token theft, credential harvesting, or account takeover without any further user interaction beyond reading mail.

AttributeValue
CVECVE-2025-66376
CWECWE-79 — Stored Cross-Site Scripting
CVSS (NIST)6.1 Medium
CVSS (Patchstack/CNA)7.2 High
Affected VersionsZCS 10.0.0–10.0.17 and 10.1.0–10.1.12
Fixed Versions10.0.18 and 10.1.13 (released November 2025)
Exploitation StatusActively exploited in the wild
FCEB Patch DeadlineApril 1, 2026

How It Works

1. Attacker crafts an HTML email containing a <style> block
   with a CSS @import directive pointing to attacker-controlled URL
2. Victim receives and opens the email in Zimbra Classic UI
3. Zimbra Classic UI renders the HTML email without stripping @import
4. Browser loads external CSS resource — triggering XSS payload execution
5. Attacker harvests Zimbra session cookie or executes further actions
   in the context of the victim's authenticated session

Why This Matters

Zimbra is deployed extensively in government, military, financial, and enterprise environments — often as the primary email platform for tens of thousands of users. Stored XSS in a mail client is particularly dangerous because:

  • The attack is weaponized via a single email — no phishing link to click
  • The payload fires on mail open or preview — passive victims are at risk
  • Session tokens harvested via XSS give full mailbox and often SSO access
  • Patches have been available since November 2025 — a months-long window of exposure for unpatched orgs

CVE-2026-20963: Microsoft SharePoint Server Deserialization RCE

Overview

A deserialization of untrusted data vulnerability in Microsoft Office SharePoint allows a network-authenticated attacker with low-level privileges to execute arbitrary code on the SharePoint server. No elevated permissions or user interaction are required beyond basic authenticated access — a low bar in most enterprise environments.

AttributeValue
CVECVE-2026-20963
CWECWE-502 — Deserialization of Untrusted Data
CVSS Score8.8 High
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected VersionsSharePoint Server 2016 (Enterprise), 2019, Subscription Edition (< 16.0.19127.20442)
FixedJanuary 2026 Microsoft Security Update
Exploitation StatusActively exploited in the wild
FCEB Patch DeadlineMarch 21, 2026 (3 days)

Attack Profile

Unlike CVE-2025-66376, which requires only a delivered email, CVE-2026-20963 requires an authenticated session — but this bar is routinely cleared by:

  • Phishing-acquired credentials (common precursor to SharePoint attacks)
  • Password spraying against low-security accounts
  • Credential reuse from prior breaches
  • Insider threat or compromised contractor accounts

Once an attacker authenticates with any valid SharePoint account, exploitation achieves full code execution on the SharePoint server — a high-value target given SharePoint's typical role storing sensitive documents, intranet data, and business workflows.


Cisco FMC CVE-2026-20131: Ransomware Confirmed (CVSS 10.0)

The third vulnerability in CISA's March 18 advisory references CVE-2026-20131, the maximum-severity (CVSS 10.0) insecure deserialization flaw in Cisco Secure Firewall Management Center that Interlock ransomware has been exploiting as a zero-day since January 26, 2026 — weeks before its public disclosure in March.

AttributeValue
CVECVE-2026-20131
CVSS Score10.0 CRITICAL
Authentication RequiredNone
ImpactUnauthenticated root RCE on Cisco FMC
Exploited ByInterlock ransomware group
Exploitation SinceJanuary 26, 2026 (zero-day)

This vulnerability was previously covered in detail in our Interlock ransomware Cisco FMC zero-day analysis.


Impact Assessment

VulnerabilityImpact AreaRisk
CVE-2025-66376 (Zimbra XSS)Mailbox takeover via session hijackHigh — email-borne, passive execution
CVE-2026-20963 (SharePoint RCE)Full server compromise, document exfiltrationHigh — any authenticated user
CVE-2026-20131 (Cisco FMC)Network security infrastructure takeoverCritical — unauthenticated, CVSS 10.0

Recommendations

For All Organizations

  • Patch all three vulnerabilities immediately. FCEB agencies have hard deadlines; private sector organizations should treat KEV additions as high-urgency regardless of compliance requirements.
  • Prioritize CVE-2026-20963 (SharePoint) — the March 21 deadline signals CISA's view that exploitation is escalating rapidly.
  • Review CISA KEV catalog regularly and align patch SLAs to KEV additions.

For Zimbra Administrators

  1. Update to ZCS 10.0.18 or 10.1.13 (patches available since November 2025)
  2. Disable HTML email rendering in Classic UI as a temporary mitigation if patching is delayed
  3. Audit webmail access logs for unusual session activity since November 2025
  4. Consider migrating from Classic UI to Zimbra Modern UI if the Classic UI is not required

For SharePoint Administrators

  1. Apply the January 2026 Microsoft Security Update — the patch has been available for months
  2. Audit SharePoint server event logs for suspicious web requests and process spawning
  3. Restrict SharePoint access to VPN or named networks if public-facing
  4. Enforce MFA on all SharePoint-authenticated accounts to raise the authentication bar

For Cisco FMC Operators

  1. Patch CVE-2026-20131 immediately — see our full advisory and response guide
  2. Treat any unpatched FMC as potentially compromised since January 2026
  3. Restrict FMC management interface to dedicated management VLANs only — never expose to the internet

Key Takeaways

  1. Three high-severity exploited vulnerabilities disclosed on a single day signals heightened threat actor activity in early 2026
  2. CVE-2026-20963 (SharePoint) has a 3-day patch deadline — the shortest possible under CISA KEV rules — reflecting severe active exploitation
  3. CVE-2025-66376 (Zimbra XSS) has been patchable since November 2025; organizations running unpatched Zimbra have been exposed for over four months
  4. Cisco FMC CVE-2026-20131 confirms ransomware groups are now consistently weaponizing network management plane vulnerabilities for maximum organizational impact
  5. All three CVEs follow the same pattern: well-known, patchable vulnerabilities being actively exploited well after patches were released — underscoring that patching velocity remains the primary defensive gap
  6. Organizations should verify these three products against current patch levels today, not during the next scheduled maintenance window

Sources

  • CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks — The Hacker News
  • CISA Known Exploited Vulnerabilities Catalog
  • Ransomware gang exploits Cisco flaw in zero-day attacks since January — BleepingComputer
  • Cisco Security Advisory — CVE-2026-20131
#CISA#KEV#Ransomware#Zero-Day#Microsoft#Cisco#Zimbra#Vulnerability

Related Articles

Interlock Ransomware Exploited Cisco FMC Zero-Day for 36 Days Before Disclosure

CVE-2026-20131, a maximum-severity CVSS 10.0 insecure deserialization flaw in Cisco Firepower Management Center, was exploited by Interlock ransomware as...

4 min read

Interlock Ransomware Has Been Exploiting Cisco FMC Zero-Day CVE-2026-20131 Since January

The Interlock ransomware gang has been actively exploiting a CVSS 10.0 insecure deserialization flaw in Cisco Secure Firewall Management Center since late...

7 min read

CISA Adds Apple DarkSword iOS Exploits, Craft CMS, and Laravel Livewire Flaws to KEV Catalog

CISA orders federal agencies to patch five actively exploited vulnerabilities by April 3, including three Apple flaws linked to the DarkSword iOS exploit...

3 min read
Back to all News