9.6

CVE-2023-32725

The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.

Data is provided by the National Vulnerability Database (NVD)
ZabbixZabbix Server Version >= 6.0.0 <= 6.0.21
ZabbixZabbix Server Version >= 6.4.0 <= 6.4.6
ZabbixZabbix Server Version7.0.0 Updatealpha1
ZabbixZabbix Server Version7.0.0 Updatealpha2
ZabbixZabbix Server Version7.0.0 Updatealpha3
ZabbixFrontend Version >= 6.0.0 <= 6.0.21
ZabbixFrontend Version >= 6.4.0 <= 6.4.6
ZabbixFrontend Version7.0.0 Updatealpha1
ZabbixFrontend Version7.0.0 Updatealpha2
ZabbixFrontend Version7.0.0 Updatealpha3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.2% 0.428
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
security@zabbix.com 9.6 2.8 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CWE-565 Reliance on Cookies without Validation and Integrity Checking

The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.