Impact
The ZenTao Webhook model.php fetchHook function contains a server‑side request forgery vulnerability that allows an attacker to force the application to make HTTP requests to arbitrary URLs. If exploited, the attacker could access internal resources, exfiltrate data, or use the system as a pivot to reach restricted services. The weakness is classified as CWE‑918.
Affected Systems
All releases of ZenTao up to version 21.7.6‑85642 are affected. The vulnerability resides in the Webhook Module component, specifically in the fetchHook method. Users of ZenTao product legacy releases should verify their version and plan to upgrade.
Risk and Exploitability
The measured CVSS score is 5.1, indicating moderate severity. The EPSS score is below 1%, suggesting a low exploitation probability in the wild at the time of analysis, although an exploit has already been made publicly available. The vulnerability can be triggered remotely through the webhook endpoint and does not require privileged credentials. Since it is not listed in KEV, no immediate coordinated mitigation guidance exists.
OpenCVE Enrichment