ZSA-2026-03
It was observed that injecting malformed input (e.g., a single quote) into parameters triggered detailed error responses across Znuny. These responses revealed sensitive backend information, including SQL query fragments, Perl module details, internal file system paths, and technology stack information. This issue is not isolated to the examples provided but occurs broadly across the Agent, Customer, and Public interface.
Fixed in: Znuny LTS 6.5.19 and Znuny 7.3.1