CVE-2026-1884

A weakness has been identified in ZenTao up to 21.7.6-85642. The impacted element is the function fetchHook of the file module/webhook/model.php of the component Webhook Module. This manipulation causes server-side request forgery. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/ez-lbz/ez-lbz.github.io/issues/9 Exploit Third Party Advisory Issue Tracking
https://github.com/ez-lbz/ez-lbz.github.io/issues/9#issue-3832844574 Exploit Third Party Advisory
https://vuldb.com/?ctiid.344264 Permissions Required VDB Entry
https://vuldb.com/?id.344264 Third Party Advisory VDB Entry
https://vuldb.com/?submit.742633 Third Party Advisory VDB Entry
https://github.com/ez-lbz/ez-lbz.github.io/issues/9 Exploit Third Party Advisory Issue Tracking
https://github.com/ez-lbz/ez-lbz.github.io/issues/9#issue-3832844574 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zentao:zentao:*:*:*:*:*:*:*:*

History

29 Apr 2026, 01:00

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una debilidad en ZenTao hasta la versión 21.7.6-85642. El elemento afectado es la función fetchHook del archivo module/webhook/model.PHP del componente Módulo Webhook. Esta manipulación causa falsificación de petición del lado del servidor. El ataque puede ser iniciado remotamente. El exploit ha sido puesto a disposición del público y podría ser utilizado para ataques. Se contactó al proveedor con antelación sobre esta divulgación pero no respondió de ninguna manera.

11 Feb 2026, 19:15

Type Values Removed Values Added
References () https://github.com/ez-lbz/ez-lbz.github.io/issues/9 - () https://github.com/ez-lbz/ez-lbz.github.io/issues/9 - Exploit, Third Party Advisory, Issue Tracking
References () https://github.com/ez-lbz/ez-lbz.github.io/issues/9#issue-3832844574 - () https://github.com/ez-lbz/ez-lbz.github.io/issues/9#issue-3832844574 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.344264 - () https://vuldb.com/?ctiid.344264 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.344264 - () https://vuldb.com/?id.344264 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.742633 - () https://vuldb.com/?submit.742633 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:zentao:zentao:*:*:*:*:*:*:*:*
First Time Zentao
Zentao zentao

05 Feb 2026, 21:15

Type Values Removed Values Added
References () https://github.com/ez-lbz/ez-lbz.github.io/issues/9 - () https://github.com/ez-lbz/ez-lbz.github.io/issues/9 -
References () https://github.com/ez-lbz/ez-lbz.github.io/issues/9#issue-3832844574 - () https://github.com/ez-lbz/ez-lbz.github.io/issues/9#issue-3832844574 -

04 Feb 2026, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 22:15

Updated : 2026-04-29 01:00


NVD link : CVE-2026-1884

Mitre link : CVE-2026-1884

CVE.ORG link : CVE-2026-1884


JSON object : View

Products Affected

zentao

  • zentao
CWE
CWE-918

Server-Side Request Forgery (SSRF)