SB20260325209 - Two vulnerabilities in Zabbix



SB20260325209 - Two vulnerabilities in Zabbix

Published: March 25, 2026

Security Bulletin ID SB20260325209
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Relative Path Traversal (CVE-ID: CVE-2026-23924)

The vulnerability allows a remote user to disclose sensitive information.

The vulnerability exists due to improper input validation in the Agent 2 Docker plugin when handling requests with the 'docker.container_info' parameter. A remote user can send a specially crafted request to read arbitrary files from running Docker containers via Docker API injection.

Successful exploitation requires the attacker to have valid credentials and access to invoke Agent 2 commands.


2) Deserialization of Untrusted Data (CVE-ID: CVE-2026-23923)

The vulnerability allows a remote attacker to instantiate arbitrary PHP classes.

The vulnerability exists due to improper input validation in the Frontend 'validate' action when handling requests. A remote attacker can send a specially crafted request to instantiate arbitrary PHP classes.

The impact depends on the environment setup but appears limited at this time.


Remediation

Install update from vendor's website.