CVE-2023-50456
- EPSS 0.13%
- Published 10.12.2023 19:15:07
- Last modified 27.05.2025 16:15:30
An issue was discovered in Zammad before 6.2.0. An attacker can trigger phishing links in generated notification emails via a crafted first or last name.
CVE-2023-50455
- EPSS 0.17%
- Published 10.12.2023 19:15:07
- Last modified 21.11.2024 08:37:01
An issue was discovered in Zammad before 6.2.0. Due to lack of rate limiting in the "email address verification" feature, an attacker could send many requests for a known address to cause Denial Of Service (generation of many emails, which would also...
CVE-2023-50454
- EPSS 0.11%
- Published 10.12.2023 19:15:07
- Last modified 21.11.2024 08:37:01
An issue was discovered in Zammad before 6.2.0. In several subsystems, SSL/TLS was used to establish connections to external services without proper validation of hostname and certificate authority. This is exploitable by man-in-the-middle attackers.
CVE-2023-50453
- EPSS 0.26%
- Published 10.12.2023 19:15:07
- Last modified 21.11.2024 08:37:01
An issue was discovered in Zammad before 6.2.0. It uses the public endpoint /api/v1/signshow for its login screen. This endpoint returns internal configuration data of user object attributes, such as selectable values, which should not be visible to ...
CVE-2023-31597
- EPSS 0.11%
- Published 18.05.2023 18:15:10
- Last modified 22.01.2025 15:15:08
An issue in Zammad v5.4.0 allows attackers to bypass e-mail verification using an arbitrary address and manipulate the data of the generated user. Attackers are also able to gain unauthorized access to existing tickets.
CVE-2023-29868
- EPSS 0.14%
- Published 02.05.2023 16:15:08
- Last modified 30.01.2025 17:15:15
Zammad 5.3.x (Fixed in 5.4.0) is vulnerable to Incorrect Access Control. An authenticated attacker with agent and customer roles could perform unauthorized changes on articles where they only have customer permissions.
CVE-2023-29867
- EPSS 0.26%
- Published 02.05.2023 16:15:08
- Last modified 30.01.2025 17:15:15
Zammad 5.3.x (Fixed 5.4.0) is vulnerable to Incorrect Access Control. An authenticated attacker could gain information about linked accounts of users involved in their tickets using the Zammad API.
CVE-2022-48021
- EPSS 0.31%
- Published 03.02.2023 01:15:13
- Last modified 26.03.2025 19:15:20
A vulnerability in Zammad v5.3.0 allows attackers to execute arbitrary code or escalate privileges via a crafted message sent to the server.
CVE-2022-48022
- EPSS 0.2%
- Published 03.02.2023 01:15:13
- Last modified 26.03.2025 19:15:20
An issue in the component /api/v1/mentions of Zammad v5.3.0 allows authenticated attackers with agent permissions to view information about tickets they are not authorized to see.
CVE-2022-48023
- EPSS 0.13%
- Published 03.02.2023 01:15:13
- Last modified 21.11.2024 07:32:45
Insufficient privilege verification in Zammad v5.3.0 allows an authenticated attacker to perform changes on the tags of their customer tickets using the Zammad API. This is now corrected in v5.3.1 so that only agents with write permissions may change...