Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
History

Wed, 03 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:horde:groupware:5.2.22:*:*:*:-:*:*:*
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Wed, 03 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Horde
Horde groupware
Vendors & Products Horde
Horde groupware

Tue, 02 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Description Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.
Title Disclosure of sensitive information in Horde Groupware
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2025-12-02T14:01:34.192Z

Updated: 2025-12-02T14:27:37.506Z

Reserved: 2025-04-16T09:09:34.457Z

Link: CVE-2025-41066

cve-icon Vulnrichment

Updated: 2025-12-02T14:27:32.880Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-02T14:16:24.910

Modified: 2025-12-03T20:08:52.853

Link: CVE-2025-41066

cve-icon Redhat

No data.