ZAA-2026-01
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Sensitive information in the admin panel, such as API tokens, secrets, and other credentials were transmitted back to the client. Even though the Zammad UI showed them in password fields, there were ways to extract them from the browser context, or retrieve them via API directly.
This was changed to mask sensitive fields with ********** when transmitting them to clients.
Special 🙏 and 🤘 and ❤️ to:
For our SaaS customers, there’s nothing you need to worry about: we’ve already taken care of everything for you.
For self hosted installations, we strongly advise admins to update their system to the latest release of Zammad.
Fixed releases can be found at:
Or just update your Zammad if installed via OS package manager.
Online version of this advisory: https://zammad.com/en/advisories/zaa-2026-01
Please see our security policy and send remarks on security issues exclusively to security@zammad.com.