Impact
This vulnerability is due to an incorrect access control check in Zammad's getting_started_controller. An unauthenticated remote attacker can invoke the getting_started endpoint and retrieve sensitive internal entity data that should be protected. The weakness is a classic access control violation, identified as CWE-284.
Affected Systems
Affected by the Zammad help‑desk application before releases 7.0.1 and 6.5.4. Any deployment of Zammad older than those patch versions is vulnerable.
Risk and Exploitability
The CVSS base score of 8.7 marks this flaw as high severity. The EPSS score of 0.00044 indicates a very low likelihood of exploitation, but the flaw is still technically simple to exploit: a remote attacker can send a request to the exposed endpoint without authentication, likely via a web browser or HTTP client. The vulnerability is not listed in the CISA KEV catalog, yet the potential for data exposure remains significant.
OpenCVE Enrichment