First published: Mon Jan 27 2025(Updated: )
Certain errors of the upstream libraries will insert sensitive information in the OTRS or ((OTRS)) Community Edition log mechanism and mails send to the system administrator. This issue affects: * OTRS 7.0.X * OTRS 8.0.X * OTRS 2023.X * OTRS 2024.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected
Credit: security@otrs.com
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | >=7.0.0<8.0.0>=2023.0>=2024.0 | |
OTRS | >=6.0.0<6.1.0 |
Update to OTRS 2025.1.x. Please note that there will be no OTRS 7 patches. Optional: Use MTA based sending on the OTRS instance e.g. postfix
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The affected versions of OTRS include 7.0.X, 8.0.X, 2023.X, and 2024.X.
CVE-2025-24389 could lead to sensitive information being logged and sent in emails to the system administrator.
To fix CVE-2025-24389, it is recommended to update to the latest patched version of OTRS provided by the vendor.
Yes, CVE-2025-24389 is a significant risk due to the potential exposure of sensitive information.
If you are using an affected version, you should apply the latest security updates and monitor logs for any unusual activity.