CVE-2026-34837
Received Received - Intake
Authorization Bypass in Zammad AI Assistance REST Endpoint

Publication date: 2026-04-08

Last updated on: 2026-04-17

Assigner: GitHub, Inc.

Description
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, he REST endpoint POST /api/v1/ai_assistance/text_tools/:id contains an authorization failure. Context data (e.g., a group or organization) supplied to be used in the AI prompt were not checked if they are accessible for the current user. This leads to having data present in the AI prompt that were not authorized before being used. A user needs to have ticket.agent permission to be able to use the provided context data. This vulnerability is fixed in 7.0.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
zammad zammad 7.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-34837 is a moderate severity vulnerability in Zammad version 7.0.0, fixed in 7.0.1. It involves a missing authorization check in the REST endpoint POST /api/v1/ai_assistance/text_tools/:id. Specifically, context data such as group or organization information used in AI prompts are not verified for accessibility by the current user.

This means that users with the ticket.agent permission can include unauthorized context data in AI prompts, potentially exposing sensitive information that they should not have access to.

The vulnerability is classified as a Missing Authorization (CWE-862) and can be exploited remotely with low complexity and no user interaction.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized exposure of sensitive context data in AI prompts within the Zammad helpdesk system.

Users with ticket.agent permissions might gain access to group or organization data that they are not authorized to see, which could result in information disclosure.

However, the vulnerability does not impact data integrity or system availability.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a missing authorization check in the REST endpoint POST /api/v1/ai_assistance/text_tools/:id in Zammad versions prior to 7.0.1. Detection would involve monitoring or testing this specific API endpoint to see if unauthorized context data is accessible or included in AI prompts.

One approach to detect this vulnerability is to perform an authorized request to the endpoint as a user with ticket.agent permissions and verify if context data (such as group or organization information) that should be restricted is accessible or included without proper authorization checks.

Suggested commands might include using curl or similar HTTP clients to send POST requests to the endpoint and inspect the responses for unauthorized data exposure. For example:

  • curl -X POST -H "Authorization: Bearer <agent_token>" https://<zammad-server>/api/v1/ai_assistance/text_tools/<id> -d '{}'
  • Analyze the response to check if context data related to groups or organizations not authorized for the user is present.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade Zammad to version 7.0.1 or later, where this authorization failure has been fixed.

Until the upgrade can be applied, restrict access to users with ticket.agent permissions and monitor usage of the AI assistance endpoint to minimize exposure.

Additionally, review and limit permissions for users who can access the AI assistance features to reduce the risk of unauthorized data exposure.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows users with ticket.agent permissions to include unauthorized context data, such as group or organization information, in AI prompts without proper authorization checks.

Such unauthorized exposure of sensitive or protected data could potentially lead to non-compliance with data protection regulations like GDPR or HIPAA, which require strict controls on access to personal or sensitive information.

Although the impact on confidentiality is considered low and there is no effect on data integrity or availability, the failure to properly restrict access to context data may violate principles of least privilege and data minimization mandated by these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart