sjabour, I think you're running this test wrong. No version of zsh has ever been vulnerable to this because it simply doesn't execute functions the same way (yes, I read this code myself, you should too).
Did you do something like this?
err% $0 --version
zsh 5.0.2 (x86_64-apple-darwin13.0)
err% env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test
If so, you, like many others on the Internet (see https://news.ycombinator.com/item?id=8361574), actually just re-tested bash, because the point there is to pass the function definition buried in the variable x *to* bash: doesn't matter if you executed it from zsh on the CLI.
Here's a valid test (running the known-bad version of bash for my shell, but passing the POC attack to /bin/zsh):
bash.CVE-2014-6271-3.2$ $0 --version
GNU bash, version 3.2.51(1)-release (x86_64-apple-darwin13)
Copyright (C) 2007 Free Software Foundation, Inc.
bash.CVE-2014-6271-3.2$ env x='() { :;}; echo vulnerable' /bin/zsh -c "echo this is a test"
this is a test
Note the lack of "vulnerable" in that output.