Impact
The vulnerability is a server‑side template injection that allows an attacker with the ability to influence the type_enrichment_data field, usually an administrative configuration, to execute arbitrary code on the Zammad server. This injection can lead to remote code execution, with full compromise of confidentiality, integrity, and availability of the affected system. The weakness is classified as Server‑Side Template Injection (CWE‑1336) and as an Improper Control of Generation of Code (CWE‑94).
Affected Systems
The flaw exists in Zammad versions released before 7.0.1. Users running any 6.x branching or earlier 7.x pre‑1 releases are exposed. The vulnerability is tied to the AI Agent feature that processes user‑supplied data for enriching tickets. Organizations deploying Zammad as a web‑based helpdesk must verify their version and upgrade if they are on a vulnerable release.
Risk and Exploitability
The CVSS base score is 8.7, reflecting the high impact of the flaw. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, implying a lower known exploitation prevalence, but the remote code execution capability makes it a serious threat. The attack requires access to a privileged configuration context where type_enrichment_data can be crafted; an attacker who can log into the administrative console or obtain related credentials could exploit the bug. Therefore, the risk is substantial if administrative access is leaked or weakly protected.
OpenCVE Enrichment