CVE-2025-32358

In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network.
References
Link Resource
https://zammad.com/en/advisories/zaa-2025-01 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*

History

15 Apr 2025, 16:36

Type Values Removed Values Added
CPE cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*
First Time Zammad
Zammad zammad
References () https://zammad.com/en/advisories/zaa-2025-01 - () https://zammad.com/en/advisories/zaa-2025-01 - Vendor Advisory

07 Apr 2025, 14:17

Type Values Removed Values Added
Summary
  • (es) En Zammad 6.4.x anterior a 6.4.2, puede producirse una SSRF. Los usuarios administradores autenticados pueden habilitar webhooks en Zammad, que se activan como solicitudes POST cuando se cumplen ciertas condiciones. Si un punto final de un webhook devolvía una respuesta de redirección, Zammad la seguía automáticamente con otra solicitud GET. Un atacante podría aprovechar esto para generar solicitudes GET, por ejemplo, en la red local.

05 Apr 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-05 21:15

Updated : 2025-04-15 16:36


NVD link : CVE-2025-32358

Mitre link : CVE-2025-32358

CVE.ORG link : CVE-2025-32358


JSON object : View

Products Affected

zammad

  • zammad
CWE
CWE-918

Server-Side Request Forgery (SSRF)