In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network.
                
            References
                    | Link | Resource | 
|---|---|
| https://zammad.com/en/advisories/zaa-2025-01 | Vendor Advisory | 
Configurations
                    History
                    15 Apr 2025, 16:36
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Zammad zammad Zammad | |
| CPE | cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:* | |
| References | () https://zammad.com/en/advisories/zaa-2025-01 - Vendor Advisory | 
07 Apr 2025, 14:17
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
05 Apr 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-05 21:15
Updated : 2025-04-15 16:36
NVD link : CVE-2025-32358
Mitre link : CVE-2025-32358
CVE.ORG link : CVE-2025-32358
JSON object : View
Products Affected
                zammad
- zammad
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
