CVE-2025-26842

7.5 HIGH

📋 TL;DR

This vulnerability in Znuny allows users with CommunicationLog access to view S/MIME encrypted email content from tickets they shouldn't have access to. It affects all Znuny installations through version 7.1.3 where S/MIME encryption is used. This represents an information disclosure vulnerability that bypasses intended access controls.

💻 Affected Systems

Products:
  • Znuny
Versions: through 7.1.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using S/MIME encrypted emails. Requires users to have CommunicationLog access permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive encrypted communications (financial data, PII, trade secrets) are exposed to unauthorized internal users, potentially leading to data breaches, regulatory violations, and reputational damage.

🟠

Likely Case

Internal users with CommunicationLog access can read confidential emails they shouldn't have permission to view, violating data privacy and confidentiality requirements.

🟢

If Mitigated

With proper access controls limiting CommunicationLog permissions to trusted administrators only, the exposure is limited to a small group of privileged users.

🌐 Internet-Facing: LOW - This vulnerability requires authenticated access to the Znuny interface and CommunicationLog permissions.
🏢 Internal Only: HIGH - The primary risk is from internal users with CommunicationLog access who can exploit this to bypass ticket access restrictions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simply accessing the CommunicationLog with appropriate permissions reveals the content.

Exploitation requires authenticated access and CommunicationLog permissions. No special technical skills needed beyond normal user access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.4 and later

Vendor Advisory: https://www.znuny.org/en/advisories/zsa-2025-01

Restart Required: Yes

Instructions:

1. Backup your Znuny installation and database. 2. Download Znuny 7.1.4 or later from the official website. 3. Follow the official upgrade procedure for your installation type. 4. Restart the Znuny service. 5. Verify the fix by checking that S/MIME encrypted content is no longer visible in CommunicationLog for unauthorized tickets.

🔧 Temporary Workarounds

Restrict CommunicationLog Access

all

Limit CommunicationLog permissions to only essential administrators who absolutely need this functionality.

Disable CommunicationLog Feature

all

Temporarily disable CommunicationLog access for all non-essential users until patching can be completed.

🧯 If You Can't Patch

  • Immediately restrict CommunicationLog permissions to the smallest possible set of trusted administrators
  • Implement additional monitoring and auditing of CommunicationLog access to detect any unauthorized viewing attempts

🔍 How to Verify

Check if Vulnerable:

1. Create a ticket with S/MIME encrypted email content. 2. Assign the ticket to a user who shouldn't have access. 3. Log in as a different user with CommunicationLog access. 4. Navigate to CommunicationLog and check if you can view the encrypted email content from the restricted ticket.

Check Version:

Check Admin → System → About in Znuny web interface or run: otrs.CheckModules.pl --all

Verify Fix Applied:

After patching, repeat the vulnerable check steps. The encrypted email content should no longer be visible in CommunicationLog for tickets the user doesn't have access to.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of CommunicationLog access, especially to tickets outside user's normal scope
  • Multiple CommunicationLog queries for encrypted email content

Network Indicators:

  • Increased traffic to CommunicationLog endpoints from non-administrative users

SIEM Query:

source="znuny" AND (event="CommunicationLog access" OR event="encrypted email view") AND user NOT IN [admin_users_list]

🔗 References

📤 Share & Export