CVE-2026-23928
- EPSS 0.06%
- Veröffentlicht 06.05.2026 08:16:03
- Zuletzt bearbeitet 07.05.2026 14:56:04
The Item history widget (in Zabbix 7.0+) or the Plain text widget (in Zabbix 6.0) can execute injected JavaScript when HTML display is enabled. This can allow an attacker to perform unauthorized actions depending on which user opens a dashboard conta...
CVE-2026-23927
- EPSS 0.05%
- Veröffentlicht 06.05.2026 08:16:02
- Zuletzt bearbeitet 07.05.2026 14:56:04
A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named sessio...
CVE-2026-23926
- EPSS 0.06%
- Veröffentlicht 06.05.2026 08:16:01
- Zuletzt bearbeitet 07.05.2026 14:56:04
An authenticated (non-super) administrator can create a maintenance period with a JavaScript payload that is executed by any user that opens tooltip for that maintenance period in the Host navigator widget. This can allow the attacker to perform unau...
CVE-2026-23924
- EPSS 0.06%
- Veröffentlicht 24.03.2026 18:30:00
- Zuletzt bearbeitet 25.03.2026 15:41:58
Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting the...
CVE-2026-23923
- EPSS 0.11%
- Veröffentlicht 24.03.2026 18:29:23
- Zuletzt bearbeitet 25.03.2026 15:41:58
An unauthenticated attacker can exploit the Frontend 'validate' action to blindly instantiate arbitrary PHP classes. The impact depends on environment setup but appears limited at this time.
CVE-2026-23921
- EPSS 0.04%
- Veröffentlicht 24.03.2026 18:28:41
- Zuletzt bearbeitet 25.03.2026 15:41:58
A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an atta...
CVE-2026-23920
- EPSS 0.06%
- Veröffentlicht 24.03.2026 18:27:52
- Zuletzt bearbeitet 25.03.2026 15:41:58
Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check an...
CVE-2026-23919
- EPSS 0.03%
- Veröffentlicht 24.03.2026 18:26:43
- Zuletzt bearbeitet 25.03.2026 15:41:58
For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts th...
CVE-2026-23925
- EPSS 0.02%
- Veröffentlicht 06.03.2026 08:24:15
- Zuletzt bearbeitet 09.03.2026 13:35:34
An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User role is normally not su...
CVE-2025-49643
- EPSS 0.1%
- Veröffentlicht 01.12.2025 13:05:33
- Zuletzt bearbeitet 06.02.2026 15:28:30
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.