Home

Description

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

PUBLISHED Reserved 2025-04-16 | Published 2025-12-02 | Updated 2025-12-02 | Assigner INCIBE




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

5.2.22
affected

Credits

Amador Aparicio finder

References

www.incibe.es/...osure-sensitive-information-horde-groupware

cve.org (CVE-2025-41066)

nvd.nist.gov (CVE-2025-41066)

Download JSON