Cyber Posture

CVE-2026-34724

HighRCE

Published: 08 April 2026

Published
08 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 20.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34724 is a high-severity Code Injection (CWE-94) vulnerability in Zammad Zammad. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Other AI Platforms.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely flaw remediation through patching to Zammad 7.0.1, eliminating the SSTI vulnerability.

prevent

Prevents exploitation of the server-side template injection by validating and sanitizing attacker-controlled type_enrichment_data inputs.

prevent

Reduces attack surface by enforcing least privilege, limiting configuration of type_enrichment_data to only necessary high-privilege administrators.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Server-side template injection in a web-based public-facing application directly enables exploitation via T1190; resulting arbitrary code execution on the server facilitates T1059 Command and Scripting Interpreter.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, a server-side template injection vulnerability which leads to RCE via AI Agent exists. Impact is limited to environments where an attacker can control or influence type_enrichment_data (typically…

more

high-privilege administrative configuration). This vulnerability is fixed in 7.0.1.

Deeper analysisAI

CVE-2026-34724 is a server-side template injection vulnerability in Zammad, a web-based open source helpdesk and customer support system. Affecting versions prior to 7.0.1, the flaw exists in the AI Agent component and allows remote code execution (RCE) when an attacker can control or influence the type_enrichment_data parameter, which is typically configured by high-privilege administrators. The vulnerability is associated with CWE-94 (Improper Control of Generation of Code) and CWE-1336 (Incorrect Handling of Code Blocks in Templating Engine), earning a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

Exploitation requires high privileges (PR:H), limiting it to authenticated attackers with administrative access who can manipulate type_enrichment_data during configuration. Successful exploitation enables arbitrary code execution on the server, potentially granting full control over the affected Zammad instance with high confidentiality, integrity, and availability impacts.

The official advisory on GitHub (GHSA-fg9w-jg8f-4j94) confirms the issue is fixed in Zammad 7.0.1, recommending immediate upgrades to mitigate the vulnerability. No workarounds are specified beyond applying the patch.

Details

CWE(s)

Affected Products

zammad
zammad
7.0.0

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: ai

CVEs Like This One

CVE-2026-34723Same product: Zammad Zammad
CVE-2026-25807Shared CWE-94
CVE-2026-30308Shared CWE-94
CVE-2026-22244Shared CWE-1336, CWE-94
CVE-2026-0491Shared CWE-94
CVE-2026-33654Shared CWE-1336, CWE-94
CVE-2026-28783Shared CWE-1336, CWE-94
CVE-2025-22906Shared CWE-94
CVE-2025-65602Shared CWE-1336, CWE-94
CVE-2026-21449Shared CWE-1336

References