<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Zammad on moltenbit</title>
    <link>https://moltenbit.net/tags/zammad/</link>
    <description>Recent content in Zammad on moltenbit</description>
    <generator>Hugo -- 0.147.2</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 08 Apr 2026 12:00:00 +0100</lastBuildDate>
    <atom:link href="https://moltenbit.net/tags/zammad/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Bypassing Zammad&#39;s AI text tool authorization via REST API (CVE-2026-34782 / CVE-2026-34837)</title>
      <link>https://moltenbit.net/posts/bypassing-zammad-ai-text-tool-authorization-via-rest-api/</link>
      <pubDate>Wed, 08 Apr 2026 12:00:00 +0100</pubDate>
      <guid>https://moltenbit.net/posts/bypassing-zammad-ai-text-tool-authorization-via-rest-api/</guid>
      <description>&lt;p&gt;Zammad 7.0 shipped in March 2026 with a set of new AI features, including customizable &amp;ldquo;text tools&amp;rdquo; that let agents use LLM-powered writing assistance within tickets. Admins can restrict these tools to specific groups, so only the Sales team gets the Sales prompt, and so on.&lt;/p&gt;
&lt;p&gt;I audited the 7.0 codebase shortly after release and found two independent authorization failures in the REST endpoint used to execute AI text tools. One bug let an agent invoke tools outside their allowed group scope. The second let the same endpoint resolve unauthorized context objects into the prompt template. As a result, data from tickets outside the agent&amp;rsquo;s access scope could end up in the AI prompt and potentially in the returned model output.&lt;/p&gt;
&lt;p&gt;Zammad patched this in 7.0.1. The findings resulted in two CVEs: &lt;a href=&#34;https://github.com/zammad/zammad/security/advisories/GHSA-96r7-29c8-2j7q&#34;&gt;CVE-2026-34782&lt;/a&gt; for the text tool authorization bypass and &lt;a href=&#34;https://github.com/zammad/zammad/security/advisories/GHSA-89vv-6639-wcv8&#34;&gt;CVE-2026-34837&lt;/a&gt; for the context data IDOR.&lt;/p&gt;
&lt;p&gt;A third finding from the same audit, a CSRF in OAuth callback endpoints (&lt;a href=&#34;https://github.com/zammad/zammad/security/advisories/GHSA-mfwp-hx66-626c&#34;&gt;CVE-2026-34721&lt;/a&gt;), was also patched in 7.0.1 and backported to 6.5.4, but is not covered in this post.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
