ZAA-2025-08
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Logging subsystem (HttpLog
) API access control is now more fine grained. In the past, any admin.*
permission was sufficient to access this data. Now, only the relevant parts can be accessed (e.g. admin.webhook
).
For our SaaS customers, there’s nothing you need to worry about: we’ve already taken care of everything for you.
For self hosted installations, we strongly advise admins to update their system to the latest release of Zammad.
Fixed releases can be found at:
Or just update your Zammad if installed via OS package manager.
Online version of this advisory: https://zammad.com/en/advisories/zaa-2025-08
Please see our security policy and send remarks on security issues exclusively to security@zammad.com.