CVE-2026-1884
📋 TL;DR
This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in ZenTao's Webhook Module. Attackers can exploit the fetchHook function to make the server send unauthorized requests to internal systems. All ZenTao instances up to version 21.7.6-85642 are affected.
💻 Affected Systems
- ZenTao
📦 What is this software?
Zentao by Zentao
⚠️ Risk & Real-World Impact
Worst Case
Attackers could pivot to internal networks, access sensitive internal services, perform port scanning, or potentially achieve remote code execution through chained attacks.
Likely Case
Unauthorized access to internal HTTP services, data exfiltration from internal endpoints, or reconnaissance of internal network infrastructure.
If Mitigated
Limited to accessing only allowed internal services with proper network segmentation and egress filtering.
🎯 Exploit Status
Exploit details are publicly available. Attack requires webhook access but is straightforward to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Vendor was contacted but did not respond. Consider upgrading to latest version if available or implementing workarounds.
🔧 Temporary Workarounds
Disable Webhook Module
allCompletely disable the vulnerable webhook module to prevent exploitation
Navigate to ZenTao admin panel > Module Management > Disable Webhook Module
Restrict Webhook Access
allLimit webhook functionality to trusted users only
Configure ZenTao permissions to restrict webhook creation/modification to administrators only
🧯 If You Can't Patch
- Implement strict network egress filtering to limit outbound connections from ZenTao server
- Deploy web application firewall (WAF) with SSRF protection rules
🔍 How to Verify
Check if Vulnerable:
Check ZenTao version in admin panel or via version file. If version is 21.7.6-85642 or earlier, system is vulnerable.
Check Version:
Check /path/to/zentaopms/VERSION file or admin panel version display
Verify Fix Applied:
Test webhook functionality with SSRF payloads. If requests to internal IPs are blocked, fix is working.
📡 Detection & Monitoring
Log Indicators:
- Unusual webhook activity
- Requests to internal IP addresses from ZenTao server
- Multiple failed webhook attempts
Network Indicators:
- Outbound HTTP requests from ZenTao server to internal IP ranges
- Unusual port scanning activity originating from ZenTao server
SIEM Query:
source="zentaopms" AND (event="webhook" OR event="fetchHook") AND dest_ip IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)
🔗 References
- https://github.com/ez-lbz/ez-lbz.github.io/issues/9
- https://github.com/ez-lbz/ez-lbz.github.io/issues/9#issue-3832844574
- https://vuldb.com/?ctiid.344264
- https://vuldb.com/?id.344264
- https://vuldb.com/?submit.742633
- https://github.com/ez-lbz/ez-lbz.github.io/issues/9
- https://github.com/ez-lbz/ez-lbz.github.io/issues/9#issue-3832844574