Search CVE reports


Toggle filters

1 – 10 of 122 results


CVE-2026-23924

Medium priority
Needs evaluation

(Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.co ...)

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-23921

Medium priority
Needs evaluation

(A low privilege Zabbix user with API access can exploit a blind SQL in ...)

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-23920

Medium priority
Needs evaluation

(Host and event action script input is validated with a regex (set by t ...)

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-23919

Medium priority
Needs evaluation

(For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape ...)

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-23925

Medium priority
Needs evaluation

An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User...

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-49643

Medium priority
Needs evaluation

An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-27232

Medium priority
Needs evaluation

An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-49641

Medium priority
Needs evaluation

A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-27237

Medium priority
Not affected

In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Not affected Not affected Not affected
Show less packages

CVE-2025-27236

Medium priority
Needs evaluation

A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages