Zabbix vulnerabilities
124 known vulnerabilities affecting zabbix/zabbix.
Total CVEs
124
CISA KEV
2
actively exploited
Public exploits
20
Exploited in wild
2
Severity breakdown
CRITICAL18HIGH42MEDIUM50LOW14
Vulnerabilities
Page 1 of 7
CVE-2026-23920HIGHCVSS 7.7≥ 7.0.0, ≤ 7.0.21≥ 7.2.0, ≤ 7.2.14+1 more2026-03-24
CVE-2026-23920 [HIGH] CWE-78 CVE-2026-23920: Host and event action script input is validated with a regex (set by the administrator), but the val
Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.
cvelistv5nvdosv
CVE-2026-23919HIGHCVSS 7.1≥ 6.0.0, ≤ 6.0.40≥ 7.0.0, ≤ 7.0.18+2 more2026-03-24
CVE-2026-23919 [HIGH] CWE-488 CVE-2026-23919: For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script ite
For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects rea
cvelistv5nvdosv
CVE-2026-23921HIGHCVSS 8.7≥ 7.0.0, ≤ 7.0.21≥ 7.2.0, ≤ 7.2.14+1 more2026-03-24
CVE-2026-23921 [HIGH] CWE-89 CVE-2026-23921: A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in inclu
A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to sessio
cvelistv5nvdosv
CVE-2026-23923MEDIUMCVSS 6.9≥ 7.4.0, ≤ 7.4.62026-03-24
CVE-2026-23923 [MEDIUM] CWE-470 CVE-2026-23923: An unauthenticated attacker can exploit the Frontend 'validate' action to blindly instantiate arbitr
An unauthenticated attacker can exploit the Frontend 'validate' action to blindly instantiate arbitrary PHP classes. The impact depends on environment setup but appears limited at this time.
cvelistv5nvd
CVE-2026-23924MEDIUMCVSS 6.1≥ 6.0.0, ≤ 6.0.43≥ 7.0.0, ≤ 7.0.22+1 more2026-03-24
CVE-2026-23924 [MEDIUM] CWE-88 CVE-2026-23924: Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when
Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
cvelistv5nvd
CVE-2026-23925MEDIUMCVSS 5.1≥ 6.0.0, ≤ 6.0.40≥ 7.0.0, ≤ 7.0.17+1 more2026-03-06
CVE-2026-23925 [MEDIUM] CWE-863 CVE-2026-23925: An authenticated Zabbix user (User role) with template/host write permissions is able to create obje
An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User role is normally not sufficient to create and edit templates/hosts even with write permissions.
cvelistv5nvdosv
CVE-2025-49643MEDIUMCVSS 6.0≥ 6.0.0, ≤ 6.0.41≥ 7.0.0, ≤ 7.0.18+2 more2025-12-01
CVE-2025-49643 [MEDIUM] CWE-405 CVE-2025-49643: An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the web
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
cvelistv5nvdosv
CVE-2025-49642MEDIUMCVSS 5.8≥ 6.0.0, ≤ 6.0.36≥ 7.0.0, ≤ 7.0.5+1 more2025-12-01
CVE-2025-49642 [MEDIUM] CWE-426 CVE-2025-49642: Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /
Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.
cvelistv5nvd
CVE-2025-27232MEDIUMCVSS 6.8≥ 7.4.0, ≤ 7.4.22025-12-01
CVE-2025-27232 [MEDIUM] CWE-918 CVE-2025-27232: An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files f
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
cvelistv5nvd
CVE-2025-27237HIGHCVSS 7.3≥ 6.0.0, ≤ 6.0.40≥ 7.0.0, ≤ 7.0.17+2 more2025-10-03
CVE-2025-27237 [HIGH] CWE-427 CVE-2025-27237: In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writabl
In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
cvelistv5nvd
CVE-2025-27231MEDIUMCVSS 4.3≥ 6.0.0, < 6.0.41≥ 7.0.0, < 7.0.18+6 more2025-10-03
CVE-2025-27231 [MEDIUM] CWE-522 CVE-2025-27231: The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
cvelistv5nvdosv
CVE-2025-49641MEDIUMCVSS 5.1≥ 6.0.0, < 6.0.41≥ 7.0.0, < 7.0.18+6 more2025-10-03
CVE-2025-49641 [MEDIUM] CWE-863 CVE-2025-49641: A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call th
A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.
cvelistv5nvdosv
CVE-2025-27236LOWCVSS 2.1≥ 6.0.38, < 6.0.41≥ 7.0.9, < 7.0.17+6 more2025-10-03
CVE-2025-27236 [LOW] CWE-863 CVE-2025-27236: A regular Zabbix user can search other users in their user group via Zabbix API by select fields the
A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.
cvelistv5nvdosv
CVE-2025-27234HIGHCVSS 7.3≥ 5.0.0, ≤ 5.0.462025-09-12
CVE-2025-27234 [HIGH] CWE-78 CVE-2025-27234: Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an att
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
cvelistv5nvdosv
CVE-2025-27240HIGHCVSS 7.5≥ 6.0.0, < 6.0.34≥ 6.4.0, < 6.4.19+4 more2025-09-12
CVE-2025-27240 [HIGH] CWE-89 CVE-2025-27240: A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting maliciou
A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.
cvelistv5nvdosv
CVE-2025-27233MEDIUMCVSS 5.7≥ 6.0.0, ≤ 6.0.39≥ 7.0.0, ≤ 7.0.10+1 more2025-09-12
CVE-2025-27233 [MEDIUM] CWE-77 CVE-2025-27233: Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an att
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
cvelistv5nvdosv
CVE-2025-27238LOWCVSS 2.1≥ 7.0.0, < 7.0.14≥ 7.2.0, < 7.2.8+2 more2025-09-12
CVE-2025-27238 [LOW] CWE-284 CVE-2025-27238: Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do
Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.
cvelistv5nvdosv
CVE-2024-36465HIGHCVSS 8.6≥ 7.0.0, ≤ 7.0.7≥ 7.2.0, < 7.2.2+2 more2025-04-02
CVE-2024-36465 [HIGH] CWE-89 CVE-2024-36465: A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
cvelistv5nvdosv
CVE-2024-45699HIGHCVSS 7.5≥ 6.0.0, < 6.0.37≥ 6.4.0, < 6.4.21+4 more2025-04-02
CVE-2024-45699 [HIGH] CWE-79 CVE-2024-45699: The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability v
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context
cvelistv5nvdosv
CVE-2024-45700MEDIUMCVSS 6.0≥ 6.0.0, < 6.0.39≥ 7.0.0, < 7.0.10+4 more2025-04-02
CVE-2024-45700 [MEDIUM] CWE-770 CVE-2024-45700: Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attac
Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.
cvelistv5nvdosv
1 / 7Next →