- EPSS 0.02%
- Veröffentlicht 01.12.2025 13:05:33
- Zuletzt bearbeitet 01.12.2025 15:39:33
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
CVE-2025-49642
- EPSS 0.02%
- Veröffentlicht 01.12.2025 13:03:38
- Zuletzt bearbeitet 01.12.2025 15:39:33
Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.
CVE-2025-27232
- EPSS 0.02%
- Veröffentlicht 01.12.2025 12:55:51
- Zuletzt bearbeitet 01.12.2025 15:39:33
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
CVE-2025-49641
- EPSS 0.04%
- Veröffentlicht 03.10.2025 11:29:26
- Zuletzt bearbeitet 08.10.2025 14:55:00
A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.
CVE-2025-27237
- EPSS 0.02%
- Veröffentlicht 03.10.2025 11:28:43
- Zuletzt bearbeitet 06.10.2025 14:56:47
In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
CVE-2025-27236
- EPSS 0.05%
- Veröffentlicht 03.10.2025 11:28:09
- Zuletzt bearbeitet 08.10.2025 14:54:42
A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.
CVE-2025-27231
- EPSS 0.03%
- Veröffentlicht 03.10.2025 11:25:14
- Zuletzt bearbeitet 08.10.2025 14:54:17
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
CVE-2025-27240
- EPSS 0.07%
- Veröffentlicht 12.09.2025 10:33:46
- Zuletzt bearbeitet 08.10.2025 14:53:38
A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.
CVE-2025-27238
- EPSS 0.02%
- Veröffentlicht 12.09.2025 10:33:17
- Zuletzt bearbeitet 08.10.2025 14:53:00
Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.
CVE-2025-27233
- EPSS 0.03%
- Veröffentlicht 12.09.2025 10:32:36
- Zuletzt bearbeitet 15.09.2025 15:21:42
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.