CVE-2025-49641
- EPSS 0.02%
- Veröffentlicht 03.10.2025 11:29:26
- Zuletzt bearbeitet 06.10.2025 14:56:47
A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.
CVE-2025-27237
- EPSS 0.01%
- Veröffentlicht 03.10.2025 11:28:43
- Zuletzt bearbeitet 06.10.2025 14:56:47
In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
CVE-2025-27236
- EPSS 0.02%
- Veröffentlicht 03.10.2025 11:28:09
- Zuletzt bearbeitet 06.10.2025 14:56:47
A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.
CVE-2025-27231
- EPSS 0.01%
- Veröffentlicht 03.10.2025 11:25:14
- Zuletzt bearbeitet 06.10.2025 14:56:47
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
CVE-2025-27240
- EPSS 0.06%
- Veröffentlicht 12.09.2025 10:33:46
- Zuletzt bearbeitet 15.09.2025 15:21:42
A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.
CVE-2025-27238
- EPSS 0.03%
- Veröffentlicht 12.09.2025 10:33:17
- Zuletzt bearbeitet 15.09.2025 19:15:34
Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.
CVE-2025-27233
- EPSS 0.03%
- Veröffentlicht 12.09.2025 10:32:36
- Zuletzt bearbeitet 15.09.2025 15:21:42
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
CVE-2025-27234
- EPSS 0.1%
- Veröffentlicht 12.09.2025 10:31:58
- Zuletzt bearbeitet 15.09.2025 15:21:42
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
CVE-2024-42325
- EPSS 0.03%
- Veröffentlicht 02.04.2025 07:15:41
- Zuletzt bearbeitet 02.04.2025 14:58:07
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.
CVE-2024-45699
- EPSS 0.05%
- Veröffentlicht 02.04.2025 07:15:41
- Zuletzt bearbeitet 02.04.2025 14:58:07
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a ...