Zabbix

Zabbix

101 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 01.12.2025 13:05:33
  • Zuletzt bearbeitet 01.12.2025 15:39:33

An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.

  • EPSS 0.02%
  • Veröffentlicht 01.12.2025 13:03:38
  • Zuletzt bearbeitet 01.12.2025 15:39:33

Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.

  • EPSS 0.02%
  • Veröffentlicht 01.12.2025 12:55:51
  • Zuletzt bearbeitet 01.12.2025 15:39:33

An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.

  • EPSS 0.04%
  • Veröffentlicht 03.10.2025 11:29:26
  • Zuletzt bearbeitet 08.10.2025 14:55:00

A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.

  • EPSS 0.02%
  • Veröffentlicht 03.10.2025 11:28:43
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.

  • EPSS 0.05%
  • Veröffentlicht 03.10.2025 11:28:09
  • Zuletzt bearbeitet 08.10.2025 14:54:42

A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.

  • EPSS 0.03%
  • Veröffentlicht 03.10.2025 11:25:14
  • Zuletzt bearbeitet 08.10.2025 14:54:17

The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.

  • EPSS 0.07%
  • Veröffentlicht 12.09.2025 10:33:46
  • Zuletzt bearbeitet 08.10.2025 14:53:38

A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.

  • EPSS 0.02%
  • Veröffentlicht 12.09.2025 10:33:17
  • Zuletzt bearbeitet 08.10.2025 14:53:00

Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.

  • EPSS 0.03%
  • Veröffentlicht 12.09.2025 10:32:36
  • Zuletzt bearbeitet 15.09.2025 15:21:42

Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.