Zabbix Frontend vulnerabilities
19 known vulnerabilities affecting zabbix/frontend.
Total CVEs
19
CISA KEV
2
actively exploited
Public exploits
2
Exploited in wild
2
Severity breakdown
CRITICAL2HIGH1MEDIUM16
Vulnerabilities
Page 1 of 1
CVE-2025-49643MEDIUMCVSS 6.0≥ 6.0.0, < 6.0.42≥ 7.0.0, < 7.0.19+2 more2025-12-01
CVE-2025-49643 [MEDIUM] CWE-405 CVE-2025-49643: An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the web
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
nvd
CVE-2025-27232MEDIUMCVSS 6.8≥ 7.4.0, < 7.4.32025-12-01
CVE-2025-27232 [MEDIUM] CWE-918 CVE-2025-27232: An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files f
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
nvd
CVE-2023-32725HIGHCVSS 8.8≥ 6.0.0, ≤ 6.0.21≥ 6.4.0, ≤ 6.4.6+1 more2023-12-18
CVE-2023-32725 [HIGH] CWE-565 CVE-2023-32725: The website configured in the URL widget will receive a session cookie when testing or executing sch
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
nvd
CVE-2023-30958MEDIUMCVSS 6.1fixed in 6.225.02023-08-03
CVE-2023-30958 [MEDIUM] CWE-83 CVE-2023-30958: A security defect was identified in Foundry Frontend that enabled users to potentially conduct DOM X
A security defect was identified in Foundry Frontend that enabled users to potentially conduct DOM XSS attacks if Foundry's CSP were to be bypassed.
This defect was resolved with the release of Foundry Frontend 6.225.0.
nvd
CVE-2023-29455MEDIUMCVSS 6.1≥ 4.0.0, ≤ 4.0.45≥ 5.0.0, ≤ 5.0.332023-07-13
CVE-2023-29455 [MEDIUM] CWE-20 CVE-2023-29455: Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflec
Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.
nvd
CVE-2023-29457MEDIUMCVSS 6.1≥ 4.0.0, ≤ 4.0.45≥ 5.0.0, ≤ 5.0.34+1 more2023-07-13
CVE-2023-29457 [MEDIUM] CWE-20 CVE-2023-29457: Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victi
Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.
nvd
CVE-2023-29456MEDIUMCVSS 5.4≥ 4.0.0, ≤ 4.0.46≥ 5.0.0, ≤ 5.0.35+2 more2023-07-13
CVE-2023-29456 [MEDIUM] CWE-20 CVE-2023-29456: URL validation scheme receives input from a user and then parses it to identify its various componen
URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.
nvd
CVE-2023-29454MEDIUMCVSS 5.4≥ 4.0.0, ≤ 4.0.45≥ 5.0.0, ≤ 5.0.33+1 more2023-07-13
CVE-2023-29454 [MEDIUM] CWE-20 CVE-2023-29454: Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the
Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
nvd
CVE-2022-43515CRITICALCVSS 9.8≥ 4.0.0, ≤ 4.0.44≥ 5.0.0, ≤ 5.0.29+9 more2022-12-05
CVE-2022-43515 [CRITICAL] CWE-20 CVE-2022-43515: Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that o
Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and a
cvelistv5nvd
CVE-2022-40626MEDIUMCVSS 6.1v6.0.0-6.0.6v6.2.02022-09-14
CVE-2022-40626 [MEDIUM] CWE-79 CVE-2022-40626: An unauthenticated user can create a link with reflected Javascript code inside the backurl paramete
An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.
cvelistv5nvd
CVE-2022-35229MEDIUMCVSS 5.4v4.0.0-4.0.42v5.0.0-5.0.24+2 more2022-07-06
CVE-2022-35229 [MEDIUM] CWE-79 CVE-2022-35229: An authenticated user can create a link with reflected Javascript code inside it for the discovery p
An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
cvelistv5nvd
CVE-2022-35230MEDIUMCVSS 5.4v4.0.0-4.0.42v5.0.0-5.0.242022-07-06
CVE-2022-35230 [MEDIUM] CWE-79 CVE-2022-35230: An authenticated user can create a link with reflected Javascript code inside it for the graphs page
An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
cvelistv5nvd
CVE-2022-24349MEDIUMCVSS 4.4≥ 4.0.0, ≤ 4.0.38≥ 5.0.0, ≤ 5.0.20+6 more2022-03-09
CVE-2022-24349 [MEDIUM] CWE-79 CVE-2022-24349: An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it t
An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineerin
cvelistv5nvd
CVE-2022-24917MEDIUMCVSS 4.4≥ 4.0.0, ≤ 4.0.38≥ 5.0.0, ≤ 5.0.20+5 more2022-03-09
CVE-2022-24917 [MEDIUM] CWE-79 CVE-2022-24917: An authenticated user can create a link with reflected Javascript code inside it for services’ page
An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can ma
cvelistv5nvd
CVE-2022-24918MEDIUMCVSS 4.4≥ 5.0.0, ≤ 5.0.20≥ 5.4.0, ≤ 5.4.10+4 more2022-03-09
CVE-2022-24918 [MEDIUM] CWE-79 CVE-2022-24918: An authenticated user can create a link with reflected Javascript code inside it for items’ page and
An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make
cvelistv5nvd
CVE-2022-24919MEDIUMCVSS 4.4≥ 4.0.0, ≤ 4.0.38≥ 5.0.0, ≤ 5.0.20+6 more2022-03-09
CVE-2022-24919 [MEDIUM] CWE-79 CVE-2022-24919: An authenticated user can create a link with reflected Javascript code inside it for graphs’ page an
An authenticated user can create a link with reflected Javascript code inside it for graphs’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can mak
cvelistv5nvd
CVE-2022-23131CRITICALCVSS 9.8KEVPoCv5.4.0 - 5.4.82022-01-13
CVE-2022-23131 [CRITICAL] CWE-290 CVE-2022-23131: In the case of instances where the SAML SSO authentication is enabled (non-default), session data ca
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML auth
cvelistv5nvd
CVE-2022-23133MEDIUMCVSS 5.4v5.0.0 – 5.0.18v5.4.0 – 5.4.82022-01-13
CVE-2022-23133 [MEDIUM] CWE-79 CVE-2022-23133: An authenticated user can create a hosts group from the configuration with XSS payload, which will b
An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to im
cvelistv5nvd
CVE-2022-23134MEDIUMCVSS 5.3KEVPoCv5.4.0 - 5.4.82022-01-13
CVE-2022-23134 [MEDIUM] CWE-284 CVE-2022-23134: After the initial setup process, some steps of setup.php file are reachable not only by super-admini
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
cvelistv5nvd