Debian Zabbix vulnerabilities
122 known vulnerabilities affecting debian/zabbix.
Total CVEs
122
CISA KEV
2
actively exploited
Public exploits
19
Exploited in wild
2
Severity breakdown
CRITICAL16HIGH23MEDIUM42LOW41
Vulnerabilities
Page 1 of 7
CVE-2026-23921HIGHCVSS 8.7fixed in zabbix 1:7.0.22+dfsg-1 (forky)2026
CVE-2026-23921 [HIGH] CVE-2026-23921: zabbix - A low privilege Zabbix user with API access can exploit a blind SQL injection vu...
A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier di
debian
CVE-2026-23919HIGHCVSS 7.1fixed in zabbix 1:7.0.22+dfsg-1 (forky)2026
CVE-2026-23919 [HIGH] CVE-2026-23919: zabbix - For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts...
For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but plea
debian
CVE-2026-23920HIGHCVSS 7.7fixed in zabbix 1:7.0.22+dfsg-1 (forky)2026
CVE-2026-23920 [HIGH] CVE-2026-23920: zabbix - Host and event action script input is validated with a regex (set by the adminis...
Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 1:7.0.22+dfsg-1)
sid: res
debian
CVE-2026-23924MEDIUMCVSS 6.12026
CVE-2026-23924 [MEDIUM] CVE-2026-23924: zabbix - Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_in...
Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: open
trixie: open
debian
CVE-2026-23925MEDIUMCVSS 5.1fixed in zabbix 1:7.0.22+dfsg-1 (forky)2026
CVE-2026-23925 [MEDIUM] CVE-2026-23925: zabbix - An authenticated Zabbix user (User role) with template/host write permissions is...
An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User role is normally not sufficient to create and edit templates/hosts even with write permissions.
Scope: local
bookworm: open
bullseye: open
f
debian
CVE-2026-23923LOWCVSS 6.92026
CVE-2026-23923 [MEDIUM] CVE-2026-23923: zabbix - An unauthenticated attacker can exploit the Frontend 'validate' action to blindl...
An unauthenticated attacker can exploit the Frontend 'validate' action to blindly instantiate arbitrary PHP classes. The impact depends on environment setup but appears limited at this time.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-27234HIGHCVSS 7.3fixed in zabbix 1:6.0.7+dfsg-2 (bookworm)2025
CVE-2025-27234 [HIGH] CVE-2025-27234: zabbix - Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get paramet...
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
Scope: local
bookworm: resolved (fixed in 1:6.0.7+dfsg-2)
bullseye: resolved (fixed in 1:5.0.47+dfsg-0+deb11u1)
forky: resolved (fixed in 1:6.0.7+dfsg-2
debian
CVE-2025-27240HIGHCVSS 7.5fixed in zabbix 1:7.0.5+dfsg-1 (forky)2025
CVE-2025-27240 [HIGH] CVE-2025-27240: zabbix - A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts b...
A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.
Scope: local
bookworm: open
bullseye: resolved
forky: resolved (fixed in 1:7.0.5+dfsg-1)
sid: resolved (fixed in 1:7.0.5+dfsg-1)
trixie: resolved (fixed in 1:7.0.5+dfsg-1)
debian
CVE-2025-49643MEDIUMCVSS 6.0fixed in zabbix 1:7.0.22+dfsg-1 (forky)2025
CVE-2025-49643 [MEDIUM] CVE-2025-49643: zabbix - An authenticated Zabbix user (including Guest) is able to cause disproportionate...
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 1:7.0.22+dfsg-1)
sid: resolved (fixed in 1:7.0.22+dfsg-1)
trixie: resolved (fixed in 1:7.0.22
debian
CVE-2025-49641MEDIUMCVSS 5.1fixed in zabbix 1:7.0.22+dfsg-1 (forky)2025
CVE-2025-49641 [MEDIUM] CVE-2025-49641: zabbix - A regular Zabbix user with no permission to the Monitoring -> Problems view is s...
A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 1:7.0.22+dfsg-1)
sid: resolved (fixed in 1:7.0.22+dfsg-1)
trixie: resolved (fixed in 1:7.0.22+dfsg-1~deb13u1)
debian
CVE-2025-27233MEDIUMCVSS 5.7fixed in zabbix 1:7.0.22+dfsg-1 (forky)2025
CVE-2025-27233 [MEDIUM] CVE-2025-27233: zabbix - Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get paramet...
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
Scope: local
bookworm: open
bullseye: resolved
forky: resolved (fixed in 1:7.0.22+dfsg-1)
sid: resolved (fixed in 1:7.0.22+dfsg-1)
trixie:
debian
CVE-2025-27231MEDIUMCVSS 4.3fixed in zabbix 1:7.0.22+dfsg-1 (forky)2025
CVE-2025-27231 [MEDIUM] CVE-2025-27231: zabbix - The LDAP 'Bind password' value cannot be read after saving, but a Super Admin ac...
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 1:7.0.22+dfsg-1)
sid: resolved (fixed in 1:7.0.22+dfsg-1)
trixie: resolved (f
debian
CVE-2025-27237LOWCVSS 7.32025
CVE-2025-27237 [HIGH] CVE-2025-27237: zabbix - In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded...
In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-27238LOWCVSS 2.1fixed in zabbix 1:7.0.22+dfsg-1 (forky)2025
CVE-2025-27238 [LOW] CVE-2025-27238: zabbix - Due to a bug in Zabbix API, the hostprototype.get method lists all host prototyp...
Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 1:7.0.22+dfsg-1)
sid: resolved (fixed in 1:7.0.22+dfsg-1)
trixie: resolved (fixed in 1:7.0.22+dfsg-1~deb13u1)
debian
CVE-2025-27236LOWCVSS 2.1fixed in zabbix 1:7.0.22+dfsg-1 (forky)2025
CVE-2025-27236 [LOW] CVE-2025-27236: zabbix - A regular Zabbix user can search other users in their user group via Zabbix API ...
A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 1:7.0.22+dfsg-1)
sid: resolved (fixed in 1:7.0.22+dfsg-1)
trixie: resolved (fixed in 1:7.
debian
CVE-2025-49642LOWCVSS 5.82025
CVE-2025-49642 [MEDIUM] CVE-2025-49642: zabbix - Library loading on AIX Zabbix Agent builds can be hijacked by local users with w...
Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2025-27232LOWCVSS 6.82025
CVE-2025-27232 [MEDIUM] CVE-2025-27232: zabbix - An authenticated Zabbix Super Admin can exploit the oauth.authorize action to re...
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2024-36461CRITICALCVSS 9.1fixed in zabbix 1:5.0.44+dfsg-1+deb11u1 (bullseye)2024
CVE-2024-36461 [CRITICAL] CVE-2024-36461: zabbix - Within Zabbix, users have the ability to directly modify memory pointers in the ...
Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
Scope: local
bookworm: open
bullseye: resolved (fixed in 1:5.0.44+dfsg-1+deb11u1)
forky: resolved (fixed in 1:7.0.1+dfsg-1)
sid: resolved (fixed in 1:7.0.1+dfsg-1)
trixie: resolved (fixed in 1:7.0.1+dfsg-1)
debian
CVE-2024-22116CRITICALCVSS 9.9fixed in zabbix 1:5.0.44+dfsg-1+deb11u1 (bullseye)2024
CVE-2024-22116 [CRITICAL] CVE-2024-22116: zabbix - An administrator with restricted permissions can exploit the script execution fu...
An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
Scope: local
bookworm: open
bullseye: resolved (fixed in 1:5.0.44+dfsg-1+de
debian
CVE-2024-42327CRITICALCVSS 9.9PoCfixed in zabbix 1:7.0.1+dfsg-1 (forky)2024
CVE-2024-42327 [CRITICAL] CVE-2024-42327: zabbix - A non-admin user account on the Zabbix frontend with the default User role, or w...
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
Scope: local
bookworm: open
bul
debian
1 / 7Next →