Release Note
OTRS Security Advisory 2025-06
Please read carefully and check if the version of your OTRS system is affected by this vulnerability.
Please send information regarding vulnerabilities in OTRS to: security@otrs.org
PGP Key
- pub 2048R/9C227C6B 2011-03-21
- uid OTRS Security Team <security@otrs.org>
- GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B
Security Advisory Details
- ID: OSA-2025-06
- Date: 2025-06-16
- Title: Unsafe handling of AJAX calls
- Severity CVSS v3.1: 3.8 LOW
- Severity CVSS v4.0: 2.1 LOW
- Urgency: LOW
- Product: OTRS
- Fixed in: OTRS 2025.5.2
- CVSS VECTOR: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L //
- CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/R:U/RE:L/U:Green
- References: CVE-2025-24388
Unsafe handling of AJAX calls
A vulnerability in the OTRS Admin Interface and Agent Interface (versions before OTRS 8) allow parameter injection due to for an autheniticated agent or admin user.
PRODUCT AFFECTED:
This issue affects
OTRS:
- OTRS 7.0.X
- OTRS 8.0.X
- OTRS 2023.X
- OTRS 2024.X
- OTRS 2025.X
- ((OTRS)) Community Edition: 6.0.x
Products based on the ((OTRS)) Community Edition also very likely to be affected.
Product Status
| Product | Affected |
| OTRS AG OTRS » Application Server
Default status is unaffected |
7.0.x 8.0.x 2023.x 2024.x from 2025.x through 2025.1.2 |
| OTRS AG ((OTRS)) Community Edition » Admin Interface, Agent Interface
Default status is affected |
6.0.x |
SOLUTION:
CREDITS:
Special thanks to Alissa Kim for reporting this vulnerability.