Description
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, unauthenticated remote attackers were able to access the getting started endpoint to get access to sensitive internal entity data, even after the system setup was completed. This vulnerability is fixed in 7.0.1 and 6.5.4.
Published: 2026-04-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is due to an incorrect access control check in Zammad's getting_started_controller. An unauthenticated remote attacker can invoke the getting_started endpoint and retrieve sensitive internal entity data that should be protected. The weakness is a classic access control violation, identified as CWE-284.

Affected Systems

Affected by the Zammad help‑desk application before releases 7.0.1 and 6.5.4. Any deployment of Zammad older than those patch versions is vulnerable.

Risk and Exploitability

The CVSS base score of 8.7 marks this flaw as high severity. EPSS data is not available, but the flaw is technically simple to exploit: a remote attacker can send a request to the exposed endpoint without authentication, likely via a web browser or HTTP client. The vulnerability is not listed in the CISA KEV catalog, yet the potential for data exposure remains significant.

Generated by OpenCVE AI on April 8, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Zammad to version 7.0.1 or newer (or 6.5.4 or newer).
  • Verify that the /getting_started endpoint is no longer accessible to unauthenticated users.
  • If upgrading is not immediately possible, restrict network access to the /getting_started endpoint using firewall rules or a web application firewall.

Generated by OpenCVE AI on April 8, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Zammad
Zammad zammad
Vendors & Products Zammad
Zammad zammad

Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, unauthenticated remote attackers were able to access the getting started endpoint to get access to sensitive internal entity data, even after the system setup was completed. This vulnerability is fixed in 7.0.1 and 6.5.4.
Title Zammad has incorrect access control in getting_started_controller
Weaknesses CWE-284
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T18:14:08.582Z

Reserved: 2026-03-30T18:41:20.753Z

Link: CVE-2026-34723

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T19:25:22.580

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-34723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:55Z

Weaknesses