CVE-2025-26844

9.8 CRITICAL

📋 TL;DR

This vulnerability in Znuny (formerly OTRS) allows attackers to steal session cookies via cross-site scripting (XSS) attacks because cookies lack the HttpOnly flag. All users of Znuny up to version 7.1.3 are affected. The missing flag enables client-side scripts to access authentication cookies.

💻 Affected Systems

Products:
  • Znuny
Versions: Through 7.1.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using default cookie settings are vulnerable. Custom configurations may also be affected if HttpOnly flag is not explicitly set.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full account takeover leading to data theft, privilege escalation, and complete system compromise through session hijacking.

🟠

Likely Case

Session hijacking allowing unauthorized access to the Znuny interface, potentially exposing sensitive ticket data and user information.

🟢

If Mitigated

Limited impact with proper network segmentation, though XSS vectors could still enable cookie theft from authenticated sessions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an XSS vector to access cookies. While no public PoC exists, the vulnerability is straightforward to exploit when combined with XSS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.4 or later

Vendor Advisory: https://www.znuny.org/en/advisories/zsa-2025-05

Restart Required: Yes

Instructions:

1. Backup your Znuny installation and database. 2. Download Znuny 7.1.4 or later from the official website. 3. Follow the upgrade instructions in the Znuny documentation. 4. Restart the Znuny service after upgrade.

🔧 Temporary Workarounds

Manual Cookie Configuration

linux

Manually configure Znuny to set HttpOnly flag on cookies via configuration files

Edit Kernel/Config.pm and add: $Self->{HttpOnly} = 1;
Restart Znuny service: systemctl restart znuny

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS vectors
  • Deploy Web Application Firewall (WAF) with XSS protection and cookie security rules

🔍 How to Verify

Check if Vulnerable:

Check if cookies lack HttpOnly flag by inspecting browser developer tools or using: curl -I https://your-znuny-url.com | grep -i set-cookie

Check Version:

znuny.Console.pl Maint::Config::Dump --options='Product' | grep Version

Verify Fix Applied:

Verify cookies now include HttpOnly flag in Set-Cookie headers after patch or configuration change

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts from new locations
  • Unusual session creation patterns
  • Administrative actions from unexpected user accounts

Network Indicators:

  • Unexpected cookie values in HTTP requests
  • Sessions originating from unusual IP ranges

SIEM Query:

source="znuny.log" ("session hijack" OR "unauthorized access" OR "cookie theft")

🔗 References

📤 Share & Export