CVE-2026-23925
- EPSS 0.01%
- Veröffentlicht 06.03.2026 08:24:15
- Zuletzt bearbeitet 09.03.2026 13:35:34
An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User role is normally not su...
CVE-2025-49643
- EPSS 0.06%
- Veröffentlicht 01.12.2025 13:05:33
- Zuletzt bearbeitet 06.02.2026 15:28:30
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
CVE-2025-49642
- EPSS 0.02%
- Veröffentlicht 01.12.2025 13:03:38
- Zuletzt bearbeitet 01.12.2025 15:39:33
Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.
CVE-2025-27232
- EPSS 0.03%
- Veröffentlicht 01.12.2025 12:55:51
- Zuletzt bearbeitet 06.02.2026 15:23:18
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
CVE-2025-49641
- EPSS 0.05%
- Veröffentlicht 03.10.2025 11:29:26
- Zuletzt bearbeitet 08.10.2025 14:55:00
A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.
CVE-2025-27237
- EPSS 0.01%
- Veröffentlicht 03.10.2025 11:28:43
- Zuletzt bearbeitet 06.10.2025 14:56:47
In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
CVE-2025-27236
- EPSS 0.05%
- Veröffentlicht 03.10.2025 11:28:09
- Zuletzt bearbeitet 08.10.2025 14:54:42
A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.
CVE-2025-27231
- EPSS 0.04%
- Veröffentlicht 03.10.2025 11:25:14
- Zuletzt bearbeitet 08.10.2025 14:54:17
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
CVE-2025-27240
- EPSS 0.06%
- Veröffentlicht 12.09.2025 10:33:46
- Zuletzt bearbeitet 08.10.2025 14:53:38
A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.
CVE-2025-27238
- EPSS 0.03%
- Veröffentlicht 12.09.2025 10:33:17
- Zuletzt bearbeitet 08.10.2025 14:53:00
Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.