Description
Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
INFO
Published Date :
2025-12-02T14:01:34.192Z
Last Modified :
2025-12-02T14:27:37.506Z
Source :
INCIBE
AFFECTED PRODUCTS
The following products are affected by CVE-2025-41066 vulnerability.
| Vendors | Products |
|---|---|
| Horde |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-41066.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact