
Cloud Vulnerability DB
A community-led vulnerabilities database
A privilege escalation vulnerability (CVE-2021-42086) was discovered in Zammad versions 1.0.x through 4.1.0. The vulnerability was disclosed on October 5, 2021, affecting the Zammad helpdesk system. Under specific conditions, Agent users could potentially modify account data and gain unauthorized admin access through crafted requests (Vendor Advisory).
The vulnerability allows Agent users to bypass access controls and modify other agent or admin user accounts through specially crafted requests. This security flaw could lead to unauthorized elevation of privileges, enabling agents to gain administrative access to the system. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The successful exploitation of this vulnerability could allow an authenticated agent user to modify account data of other agents and administrators, potentially gaining full administrative access to the Zammad system. This could lead to unauthorized access to sensitive information, system configuration changes, and complete control over the helpdesk system (Vendor Advisory).
The vulnerability has been fixed in Zammad versions 4.1.1 and 5.0.0. Organizations are strongly recommended to upgrade to these or later versions. Updates can be obtained through the official Zammad website, FTP server, or through OS package managers (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."