CVE-2026-23921 — SQL Injection in Zabbix
Severity
8.7HIGHNVD
EPSS
0.0%
top 90.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 24
Latest updateApr 6
Description
A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise.
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Packages2 packages
🔴Vulnerability Details
4OSV
▶
OSV▶
CVE-2026-23921: A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService↗2026-03-24
GHSA▶
GHSA-j24v-fg24-6mqq: A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService↗2026-03-24
📋Vendor Advisories
1Debian▶
CVE-2026-23921: zabbix - A low privilege Zabbix user with API access can exploit a blind SQL injection vu...↗2026