CVE-2026-34719
Zammad has a Server-side request forgery (SSRF) via webhooks
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
11th
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the webhook model was missing a proper validation for loop back addresses, or link-local addresses โ only the URL scheme (HTTP/HTTPS) as well as the hostname was checked. This could end up in retrieving confidential metadata of cloud/hosting providers. The existing check is now extended and is applied when configuring webhooks as well as triggering webhook jobs. This vulnerability is fixed in 7.0.1 and 6.5.4.
| CWE | CWE-918 |
| Vendor | zammad |
| Product | zammad |
| Published | Apr 8, 2026 |
| Last Updated | Apr 10, 2026 |
Stay Ahead of the Next One
Get instant alerts for zammad zammad
Be the first to know when new medium vulnerabilities affecting zammad zammad are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
zammad / zammad
< 6.5.4 >= 7.0.0-alpha, < 7.0.1