Vulnerabilities (CVE)

Filtered by vendor Zabbix Subscribe
Filtered by product Zabbix
Total 95 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-22120 1 Zabbix 1 Zabbix 2025-10-08 N/A 9.1 CRITICAL
Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
CVE-2024-36465 1 Zabbix 1 Zabbix 2025-10-08 N/A 8.8 HIGH
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
CVE-2024-36466 1 Zabbix 1 Zabbix 2025-10-08 N/A 8.8 HIGH
A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
CVE-2025-49641 1 Zabbix 1 Zabbix 2025-10-08 N/A 4.3 MEDIUM
A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.
CVE-2025-27236 1 Zabbix 1 Zabbix 2025-10-08 N/A 6.5 MEDIUM
A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.
CVE-2025-27231 1 Zabbix 1 Zabbix 2025-10-08 N/A 4.9 MEDIUM
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
CVE-2025-27240 1 Zabbix 1 Zabbix 2025-10-08 N/A 7.2 HIGH
A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.
CVE-2025-27238 1 Zabbix 1 Zabbix 2025-10-08 N/A 3.5 LOW
Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.
CVE-2016-10134 1 Zabbix 1 Zabbix 2025-04-20 7.5 HIGH 9.8 CRITICAL
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
CVE-2017-2824 1 Zabbix 1 Zabbix 2025-04-20 6.8 MEDIUM 8.1 HIGH
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
CVE-2016-4338 1 Zabbix 1 Zabbix 2025-04-20 6.8 MEDIUM 8.1 HIGH
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.
CVE-2014-9450 1 Zabbix 1 Zabbix 2025-04-12 7.5 HIGH N/A
Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.
CVE-2014-1685 2 Fedoraproject, Zabbix 2 Fedora, Zabbix 2025-04-12 5.5 MEDIUM N/A
The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote "Zabbix Admin" users to modify the media of arbitrary users via unspecified vectors.
CVE-2014-1682 2 Fedoraproject, Zabbix 2 Fedora, Zabbix 2025-04-12 4.0 MEDIUM N/A
The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.
CVE-2024-22121 1 Zabbix 1 Zabbix 2024-12-10 N/A 6.1 MEDIUM
A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application.
CVE-2024-36462 1 Zabbix 1 Zabbix 2024-12-10 N/A 7.5 HIGH
Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system.
CVE-2023-32723 1 Zabbix 1 Zabbix 2024-11-21 N/A 8.5 HIGH
Request to LDAP is sent before user permissions are checked.
CVE-2023-29452 1 Zabbix 1 Zabbix 2024-11-21 N/A 5.5 MEDIUM
Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider.
CVE-2023-29451 1 Zabbix 1 Zabbix 2024-11-21 N/A 4.7 MEDIUM
Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.
CVE-2022-43516 2 Microsoft, Zabbix 2 Windows Firewall, Zabbix 2024-11-21 N/A 6.5 MEDIUM
A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)