Changeflow GovPing Data Privacy & Cybersecurity Znuny Vulnerability Allows Remote Cross-Site Sc...
Priority review Notice Amended Final

Znuny Vulnerability Allows Remote Cross-Site Scripting Attack

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 23rd, 2026
Detected March 24th, 2026
Email

Summary

CERT-Bund has issued a security advisory regarding a vulnerability in Znuny, an open-source ticketing software. The vulnerability allows remote attackers to perform a Cross-Site Scripting (XSS) attack. Affected versions include Znuny LTS <6.5.19 and Znuny <7.3.1.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0826) detailing a critical vulnerability in the open-source ticketing software Znuny. The vulnerability, identified with a CVSS Base Score of 6.1, allows remote, anonymous attackers to exploit a flaw to conduct Cross-Site Scripting (XSS) attacks. This affects Znuny LTS versions prior to 6.5.19 and Znuny versions prior to 7.3.1, impacting Linux and UNIX operating systems.

Organizations using affected versions of Znuny must take immediate action to mitigate this risk. It is recommended to update to the patched versions (Znuny LTS >= 6.5.19 or Znuny >= 7.3.1) as soon as possible. Failure to do so could expose systems to unauthorized data access or manipulation through XSS attacks, potentially compromising sensitive ticket information and user credentials.

What to do next

  1. Update Znuny LTS to version 6.5.19 or later
  2. Update Znuny to version 7.3.1 or later
  3. Review system logs for signs of exploitation

Source document (simplified)

[WID-SEC-2026-0826] Znuny: Schwachstelle ermöglicht Cross-Site Scripting CVSS Base Score 6.1 (mittel) CVSS Temporal Score 5.5 (mittel) Remoteangriff ja Datum 23.03.2026 Stand 24.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX

Produktbeschreibung

Znuny ist eine Open Source Ticketing Software.

Produkte

23.03.2026
- Znuny Znuny LTS <6.5.19

  • Znuny Znuny <7.3.1

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Znuny ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Named provisions

Betroffene Systeme Angriff

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 23rd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0826

Who this affects

Applies to
Employers
Industry sector
5112 Software & Technology
Activity scope
IT Security Software Management
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software Vulnerabilities Data Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.