Description
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, a server-side template injection vulnerability which leads to RCE via AI Agent exists. Impact is limited to environments where an attacker can control or influence type_enrichment_data (typically high-privilege administrative configuration). This vulnerability is fixed in 7.0.1.
Published: 2026-04-08
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a server‑side template injection that allows an attacker with the ability to influence the type_enrichment_data field, usually an administrative configuration, to execute arbitrary code on the Zammad server. This injection can lead to remote code execution, with full compromise of confidentiality, integrity, and availability of the affected system. The weakness is classified as Server‑Side Template Injection (CWE‑1336) and as an Improper Control of Generation of Code (CWE‑94).

Affected Systems

The flaw exists in Zammad versions released before 7.0.1. Users running any 6.x branching or earlier 7.x pre‑1 releases are exposed. The vulnerability is tied to the AI Agent feature that processes user‑supplied data for enriching tickets. Organizations deploying Zammad as a web‑based helpdesk must verify their version and upgrade if they are on a vulnerable release.

Risk and Exploitability

The CVSS base score is 8.7, reflecting the high impact of the flaw. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, implying a lower known exploitation prevalence, but the remote code execution capability makes it a serious threat. The attack requires access to a privileged configuration context where type_enrichment_data can be crafted; an attacker who can log into the administrative console or obtain related credentials could exploit the bug. Therefore, the risk is substantial if administrative access is leaked or weakly protected.

Generated by OpenCVE AI on April 8, 2026 at 19:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Zammad to version 7.0.1 or later.
  • If an upgrade cannot be performed immediately, restrict or disable the ability to modify type_enrichment_data so only properly authenticated administrators can modify it; consider disabling the AI Agent feature.
  • Ensure strong authentication, including multi‑factor, for all administrative accounts.
  • Monitor logs for unauthorized changes to configuration fields and for suspicious activity that may indicate exploitation attempts.
  • Apply general security hardening: patch other software components, limit network exposure, and follow best practices for web application security.

Generated by OpenCVE AI on April 8, 2026 at 19:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Zammad
Zammad zammad
Vendors & Products Zammad
Zammad zammad

Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, a server-side template injection vulnerability which leads to RCE via AI Agent exists. Impact is limited to environments where an attacker can control or influence type_enrichment_data (typically high-privilege administrative configuration). This vulnerability is fixed in 7.0.1.
Title Zammad has a server-side template injection leading to RCE via AI Agent
Weaknesses CWE-1336
CWE-94
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T18:17:30.178Z

Reserved: 2026-03-30T18:41:20.753Z

Link: CVE-2026-34724

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T19:25:22.723

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-34724

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T20:12:34Z

Weaknesses