CVE-2025-27232Server-Side Request Forgery in Frontend

Severity
6.8MEDIUMNVD
EPSS
0.0%
top 85.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 1

Description

An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDzabbix/frontend7.4.07.4.3
CVEListV5zabbix/zabbix7.4.07.4.2

🔴Vulnerability Details

3
GHSA
GHSA-q44w-9xjg-492g: An authenticated Zabbix Super Admin can exploit the oauth2025-12-01
OSV
CVE-2025-27232: An authenticated Zabbix Super Admin can exploit the oauth2025-12-01
CVEList
Frontend arbitrary file read in oauth.authorize action2025-12-01

📋Vendor Advisories

2
Red Hat
zabbix: Zabbix: Authenticated Super Admin can read arbitrary files via oauth.authorize action2025-12-01
Debian
CVE-2025-27232: zabbix - An authenticated Zabbix Super Admin can exploit the oauth.authorize action to re...2025
CVE-2025-27232 — Server-Side Request Forgery | cvebase