In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://zammad.com/en/advisories/zaa-2025-01 |
![]() ![]() |
History
Mon, 07 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 05 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-918 | |
Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-04-05T00:00:00.000Z
Updated: 2025-04-07T16:12:55.755Z
Reserved: 2025-04-05T00:00:00.000Z
Link: CVE-2025-32358

Updated: 2025-04-07T16:12:51.848Z

Status : Awaiting Analysis
Published: 2025-04-05T21:15:40.487
Modified: 2025-04-07T14:17:50.220
Link: CVE-2025-32358

No data.