Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33666: n/a

0
High
VulnerabilityCVE-2024-33666cvecve-2024-33666
Published: Fri Apr 26 2024 (04/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Zammad before 6.3.0. Users with customer access to a ticket could have accessed time accounting details of this ticket via the API. This data should be available only to agents.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 04:32:40 UTC

Technical Analysis

CVE-2024-33666 is a vulnerability identified in the Zammad open-source helpdesk and customer support platform, affecting versions prior to 6.3.0. The flaw arises from improper access control enforcement in the API, allowing users with customer-level access to a ticket to retrieve time accounting details associated with that ticket. Time accounting data typically includes sensitive information such as logged work hours and billing-related metrics, which are intended to be accessible only by agents or internal staff. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system fails to adequately restrict access to sensitive resources. The CVSS v3.1 base score is 8.6 (high), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L, meaning the vulnerability is remotely exploitable over the network without authentication or user interaction, and it results in high confidentiality impact, low integrity impact, and low availability impact. Although no known exploits have been reported in the wild, the ease of exploitation and the sensitivity of the exposed data make this a significant security concern. The vulnerability could lead to unauthorized disclosure of internal operational data, potentially aiding attackers in reconnaissance or enabling insider threats. The issue was publicly disclosed on April 26, 2024, and users are advised to upgrade to Zammad 6.3.0 or later, where the access control flaw has been addressed.

Potential Impact

The primary impact of CVE-2024-33666 is unauthorized disclosure of sensitive time accounting data within the Zammad ticketing system. This can compromise confidentiality by exposing internal operational metrics, such as time spent on tasks, which may reveal business processes, resource allocation, or billing information. Such exposure could facilitate social engineering, competitive intelligence gathering, or insider threats. Although the integrity and availability impacts are rated low, the confidentiality breach alone can have serious consequences, including loss of customer trust and regulatory compliance violations if sensitive data is mishandled. Organizations relying on Zammad for customer support and ticket management worldwide are at risk, particularly those handling sensitive or regulated data. The vulnerability's ease of exploitation without authentication increases the risk of automated or opportunistic attacks. While no active exploitation is currently known, the public disclosure and high CVSS score suggest that threat actors may develop exploits, increasing the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2024-33666, organizations should: 1) Upgrade Zammad to version 6.3.0 or later as soon as it becomes available, as this version includes the fix for the improper access control issue. 2) In the interim, restrict API access by implementing network-level controls such as IP whitelisting or VPN access to limit exposure to trusted users only. 3) Review and tighten role-based access controls within Zammad to ensure customer users cannot access agent-only data fields. 4) Monitor API logs for unusual access patterns or attempts to retrieve time accounting data by unauthorized users. 5) If possible, disable or limit the API endpoints that expose ticket time accounting details until the patch is applied. 6) Educate internal teams about the sensitivity of time accounting data and the importance of promptly applying security updates. 7) Conduct regular audits of user permissions and API usage to detect and prevent privilege escalation or unauthorized data access. These steps go beyond generic advice by focusing on interim protective measures and proactive monitoring until the official patch is deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c44b7ef31ef0b561c06

Added to database: 2/25/2026, 9:40:20 PM

Last enriched: 2/26/2026, 4:32:40 AM

Last updated: 4/12/2026, 10:48:07 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses