OTRS Community Edition (version 6.0.x)
Znuny LTS (version 6.5.4 and below)
Znuny Features (version 7.0.13 and below)
Older versions of software often lack the latest features and enhancements introduced in newer iterations. The OTRS CE, while once reliable, may now lack essential functionalities crucial for modern business operations.
Features such as advanced reporting tools, automation capabilities, or integrations with newer software might be absent, hindering workflow optimization.
In an evolving technological landscape, an outdated OTRS CE / Znuny LTS / Znuny Features version might face compatibility issues with newer operating systems, browsers, or hardware.
This can lead to performance glitches, system crashes, or incompatibility with essential third-party applications, hampering overall productivity.
As newer versions are released, community focus and support gradually shift towards them. This shift leaves users of older versions with limited access to community-driven updates, forums, and documentation.
Resolving issues or seeking guidance might become increasingly challenging without an active support network dedicated to older versions.
With the advancement of data protection regulations and compliance standards, older software versions might fail to meet the stringent requirements set by various regulatory bodies.
This could pose legal risks and compliance challenges for businesses that handle sensitive customer data.
One of the most critical drawbacks of using an outdated OTRS CE / Znuny LTS / Znuny Features is the increased risk of security vulnerabilities. As software ages, developers may discontinue support or updates for older versions, leaving them susceptible to cyber threats and exploits.
Without regular security patches, the system becomes a potential target for malicious attacks, compromising sensitive data and undermining business integrity.
| Details | CVE | Severity | Date |
|---|---|---|---|
| Possible XSS attack via customer user administration | none | low | 2023-08-23 |
| Protocol-relative links display external images (without confirmation) | none | low | 2023-06-14 |
| SQL injection vulnerability in Kernel::System::Ticket::TicketSearch | CVE-2022-4427 | medium | 2022-12-19 |
| Possible to execute Perl code in ACLs | pending | medium | 2022-06-14 |
| Possible to execute Perl code in AdminUser | pending | medium | 2022-06-14 |
| Possible to get elevated permissions via Template Toolkit | pending | medium | 2022-04-28 |
| Possible XSS attack via package manager | pending | medium | 2022-04-20 |
| Authenticated remote code execution | pending | medium | 2022-04-20 |
| jQuery UI XSS vulnerabilities | CVE-2021-41182, CVE-2021-41183, CVE-2021-41184 | medium | 2022-03-09 |
| Access to calendars without permission | CVE-2021-36091 | low | 2021-08-05 |
| Unauthorized listing of the customer user emails | CVE-2021-21443 | low | 2021-08-05 |
| XSS vulnerability in Time Accounting addon | CVE-2021-21442 | medium | 2021-08-04 |
| Critical XSS vulnerability | Pending | high | 2021-04-21 |
| XSS vulnerability | CVE-2021-21434 | low | 2021-03-10 |
| DoS – denial of service | CVE-Pending | medium | medium |
Moving Forward: Considerations and Recommendations
Consider upgrading to a newer version of Znuny LTS / Znuny Features or exploring alternative modern helpdesk solutions that align with current business needs and offer robust security features.
Conduct periodic evaluations of software systems to ensure they meet evolving business requirements, security standards, and compliance regulations.
If an immediate upgrade isn’t feasible, invest in training and knowledge-sharing sessions to optimize the use of the current system.

