37 results (0.010 seconds)

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

01 Dec 2025 — An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service. • https://support.zabbix.com/browse/ZBX-27284 • CWE-405: Asymmetric Resource Consumption (Amplification) •

CVSS: 5.8EPSS: 0%CPEs: 3EXPL: 0

01 Dec 2025 — Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory. • https://support.zabbix.com/browse/ZBX-27283 • CWE-426: Untrusted Search Path •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

03 Oct 2025 — A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems. • https://support.zabbix.com/browse/ZBX-27063 • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 2

03 Oct 2025 — In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL. • https://packetstorm.news/files/id/214429 • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

03 Oct 2025 — A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to. • https://support.zabbix.com/browse/ZBX-27060 • CWE-863: Incorrect Authorization •

CVSS: 9.1EPSS: 0%CPEs: 4EXPL: 0

03 Oct 2025 — The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change. • https://support.zabbix.com/browse/ZBX-27062 • CWE-522: Insufficiently Protected Credentials •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

12 Sep 2025 — A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field. • https://support.zabbix.com/browse/ZBX-26986 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.7EPSS: 0%CPEs: 3EXPL: 0

12 Sep 2025 — Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system. • https://support.zabbix.com/browse/ZBX-26987 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

02 Apr 2025 — Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash. • https://support.zabbix.com/browse/ZBX-26253 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

02 Apr 2025 — The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser. • https://support.zabbix.com/browse/ZBX-26254 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •