Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33668: n/a

0
Critical
VulnerabilityCVE-2024-33668cvecve-2024-33668
Published: Fri Apr 26 2024 (04/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33668 is a critical vulnerability in Zammad versions prior to 6. 3. 0 involving insecure and partially guessable FormIDs used by the Zammad Upload Cache. An unauthenticated attacker can brute force these FormIDs to upload malicious content to article drafts they do not have permission to access. This vulnerability allows full compromise of confidentiality and integrity without requiring user interaction or authentication. The flaw stems from improper access control and predictable identifiers (CWE-639). Although no known exploits are currently reported in the wild, the high CVSS score (9. 1) indicates a severe risk. Organizations using Zammad for ticketing or customer support should urgently upgrade to version 6. 3.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:33:10 UTC

Technical Analysis

CVE-2024-33668 is a critical security vulnerability affecting Zammad, an open-source helpdesk and customer support platform, in versions prior to 6.3.0. The vulnerability arises from the use of insecure, partially guessable FormIDs by the Zammad Upload Cache mechanism to identify uploaded content. These FormIDs are intended to associate uploaded files with article drafts. However, due to their predictability, an attacker without any authentication or user interaction can perform brute force attacks to guess valid FormIDs. Successfully guessing a FormID allows the attacker to upload arbitrary malicious content to article drafts they do not have legitimate access to, thereby compromising the confidentiality and integrity of the system's data. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key) because the system relies on weak identifiers for access control rather than robust authentication or authorization checks. The CVSS v3.1 base score is 9.1, reflecting the vulnerability's ease of exploitation (network attack vector, no privileges required, no user interaction) and its high impact on confidentiality and integrity. Although no public exploits have been reported yet, the vulnerability poses a significant risk to organizations using affected Zammad versions, especially those managing sensitive customer or internal data. The lack of a patch link in the provided data suggests that users should verify the availability of updates from official Zammad sources and apply version 6.3.0 or later where the issue is resolved.

Potential Impact

The impact of CVE-2024-33668 is substantial for organizations using Zammad as their helpdesk or customer support platform. An attacker exploiting this vulnerability can upload malicious content to article drafts without any authentication, potentially injecting malware, phishing content, or unauthorized data modifications. This can lead to data breaches, loss of customer trust, and disruption of support operations. Since the vulnerability affects confidentiality and integrity but not availability, the attacker could manipulate or exfiltrate sensitive information without necessarily causing service downtime. The ease of exploitation and network accessibility make it a high-risk threat, especially for organizations with publicly accessible Zammad instances. Additionally, attackers could use this vector as a foothold for further lateral movement or privilege escalation within the affected environment. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of remediation given the critical severity and potential for rapid weaponization.

Mitigation Recommendations

To mitigate CVE-2024-33668, organizations should immediately upgrade Zammad to version 6.3.0 or later, where the vulnerability has been addressed. If upgrading is not immediately feasible, implement network-level access controls to restrict access to the upload cache endpoints only to trusted internal users or IP ranges. Enhance monitoring and logging around upload activities to detect abnormal or brute force attempts targeting FormIDs. Consider implementing additional application-layer protections such as rate limiting and CAPTCHA challenges to hinder automated brute force attacks. Review and strengthen the unpredictability of any tokens or identifiers used for upload authorization to prevent guessability. Conduct a thorough audit of existing article drafts and uploaded content for signs of unauthorized modifications or malicious files. Finally, maintain up-to-date backups and incident response plans to quickly recover from any compromise resulting from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c44b7ef31ef0b561c0c

Added to database: 2/25/2026, 9:40:20 PM

Last enriched: 2/26/2026, 4:33:10 AM

Last updated: 2/26/2026, 9:39:30 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats