
Cloud Vulnerability DB
A community-led vulnerabilities database
An access control vulnerability was discovered in Zammad v5.0.3 that allows attackers to write entries to the CTI caller log without authentication (CVE-2022-27332). The vulnerability was disclosed on March 14, 2022 and has been fixed in Zammad version 5.1.0 (Zammad Advisory).
The vulnerability stems from incorrect access checking in the CTI caller log functionality. The issue has a CVSS v3.1 base score of 9.1 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) and is classified as CWE-306: Missing Authentication for Critical Function (NVD).
This vulnerability could allow attackers to execute phishing attacks or cause a Denial of Service (DoS) by manipulating the CTI caller log without requiring authentication (Zammad Advisory).
The vulnerability has been fixed in Zammad version 5.1.0. Users are recommended to upgrade to this version or later. The fix can be obtained through the official Zammad website, FTP server, or via OS package manager updates (Zammad Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."