Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1024

NIXPKGS-2026-1024
published on
updated 5 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.zammad-py
  • @LeSuisse removed package python313Packages.zammad-py
  • @LeSuisse removed package python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad has a Server-side request forgery (SSRF) via webhooks

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the webhook model was missing a proper validation for loop back addresses, or link-local addresses — only the URL scheme (HTTP/HTTPS) as well as the hostname was checked. This could end up in retrieving confidential metadata of cloud/hosting providers. The existing check is now extended and is applied when configuring webhooks as well as triggering webhook jobs. This vulnerability is fixed in 7.0.1 and 6.5.4.

Affected products

zammad
  • ==< 6.5.4
  • ==>= 7.0.0-alpha, < 7.0.1

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers