Why teams of all sizes choose Zammad for structured, reliable support.
ZAA-2025-01
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Security Advisory Details
- ID: ZAA-2025-01
- Date: 2025-04-02
- Title: Server Side Request Forgery
- Severity: low
- Product: Zammad 6.4.x
- Fixed in: Zammad 6.5.0, 6.4.2
- References:
--> CVE-2025-32358
Vulnerability Descriptions
Server Side Request Forgery
Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network.
Special 🙏 and 🤘 and ❤️ to:
- N: Rodrigo Magalhães & Timothy Tjen A Looi
- C: Randstad
- W: https://www.randstad.com/
Recommended Resolution
This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.
Fixed releases can be found at:
Or just update your Zammad if installed via OS package manager.
Additional information
Online version of this advisory: https://zammad.com/en/advisories/zaa-2025-01
Please see our security policy and send remarks on security issues exclusively to security@zammad.com.