CVE-2026-34719 PUBLISHED

Zammad has a Server-side request forgery (SSRF) via webhooks

Assigner: GitHub_M
Reserved: 30.03.2026 Published: 08.04.2026 Updated: 08.04.2026

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the webhook model was missing a proper validation for loop back addresses, or link-local addresses — only the URL scheme (HTTP/HTTPS) as well as the hostname was checked. This could end up in retrieving confidential metadata of cloud/hosting providers. The existing check is now extended and is applied when configuring webhooks as well as triggering webhook jobs. This vulnerability is fixed in 7.0.1 and 6.5.4.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:L/SI:N/SA:H
CVSS Score: 8.3

Product Status

Vendor zammad
Product zammad
Versions
  • Version < 6.5.4 is affected
  • Version >= 7.0.0-alpha, < 7.0.1 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE