ZAA-2026-06
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Due to improper SQL statement sanitization, authorized agent or customer users were able to use several API endpoints to inject custom statements to SQL queries. This could lead to the execution of unwanted operations on database level.
Special 🙏 and 🤘 and ❤️:
This issue was discovered with the GitHub Security Lab Taskflow Agent and manually verified by GHSL team members @p- (Peter Stöckli) and @m-y-mo (Man Yue Mo)
For our SaaS customers, there’s nothing you need to worry about: we’ve already taken care of everything for you.
For self hosted installations, we strongly advise admins to update their system to the latest release of Zammad.
Fixed releases can be found at:
Or just update your Zammad if installed via OS package manager.
Online version of this advisory: https://zammad.com/en/advisories/zaa-2026-06
Please see our security policy and send remarks on security issues exclusively to security@zammad.com.