{"id":"CVE-2022-45911","details":"An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur on the Classic UI login page by injecting arbitrary JavaScript code in the username field. This occurs before the user logs into the system, which means that even if the attacker executes arbitrary JavaScript, they will not get any sensitive information.","modified":"2026-04-10T04:52:32.850897Z","published":"2023-01-06T23:15:09.673Z","references":[{"type":"ADVISORY","url":"https://wiki.zimbra.com/wiki/Security_Center"},{"type":"ADVISORY","url":"https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zimbra/zm-build","events":[{"introduced":"0"},{"last_affected":"b6cd8f69d2761c014d4a3807f0bdee0011386444"},{"introduced":"0"},{"last_affected":"de2eedbbdb8d58c34aac58dbf3866ae721f039eb"},{"introduced":"0"},{"last_affected":"5561a39cba0898c3bb5e188284d98f498d7a3c9a"},{"introduced":"0"},{"last_affected":"5561a39cba0898c3bb5e188284d98f498d7a3c9a"},{"introduced":"0"},{"last_affected":"d3209df466110d214b2ab6593f931a59c2127db8"},{"introduced":"0"},{"last_affected":"c8a93da38fd1572d864c1becbcc772ba91ee4403"},{"introduced":"0"},{"last_affected":"202d83762fca70b7403c144e1fedddc6cd4930a6"},{"introduced":"0"},{"last_affected":"a163a5dc09ec091fed86421118ec56c90384997a"},{"introduced":"0"},{"last_affected":"b2faf1c074bf6e2f4f76acd11b9ad5a0b4caec40"},{"introduced":"0"},{"last_affected":"03d99a16095b73a73770fbb6131d10234cfc13fd"},{"introduced":"0"},{"last_affected":"bcb978ccc354d99d843725886083e321759b6765"},{"introduced":"0"},{"last_affected":"b20d016c829af1c0ffbaa0545c1deb96ccd5e2e5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"9.0.0-NA"},{"introduced":"0"},{"last_affected":"9.0.0-p0"},{"introduced":"0"},{"last_affected":"9.0.0-p1"},{"introduced":"0"},{"last_affected":"9.0.0-p19"},{"introduced":"0"},{"last_affected":"9.0.0-p20"},{"introduced":"0"},{"last_affected":"9.0.0-p23"},{"introduced":"0"},{"last_affected":"9.0.0-p25"},{"introduced":"0"},{"last_affected":"9.0.0-p26"},{"introduced":"0"},{"last_affected":"9.0.0-p27"},{"introduced":"0"},{"last_affected":"9.0.0-p4"},{"introduced":"0"},{"last_affected":"9.0.0-p7"},{"introduced":"0"},{"last_affected":"9.0.0-p7\\.1"}]}}],"versions":["8.7.10","8.7.11","8.7.6","8.7.7","8.7.9","8.8.0.beta1","8.8.10","8.8.12","8.8.2","8.8.3","8.8.4","8.8.6","8.8.7","8.8.8","8.8.9","8.8.9.p1","8.8.9.p3","9.0.0","9.0.0.U20","9.0.0.p0","9.0.0.p19","9.0.0.p23","9.0.0.p25","9.0.0.p26","9.0.0.p27","9.0.0.p4","9.0.0.p7","9.0.0.p7.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p10"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p11"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p12"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p13"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p14"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p15"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p16"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p21"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p24"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p24\\.1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p3"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p5"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p6"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p8"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0.0-p9"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45911.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}