SB2026051012 - Fedora EPEL 10.1 update for zabbix7.0



SB2026051012 - Fedora EPEL 10.1 update for zabbix7.0

Published: May 10, 2026

Security Bulletin ID SB2026051012
CSH Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Cross-site scripting (CVE-ID: CVE-2026-23928)

The vulnerability allows a remote user to perform unauthorized actions.

The vulnerability exists due to cross-site scripting in the Item history/Plain text widget when rendering monitored host data with HTML display enabled. A remote privileged user can send a malicious JavaScript payload from a controlled monitored host to perform unauthorized actions.

User interaction is required, and exploitation occurs when a user opens a dashboard containing the affected widget.


2) Input validation error (CVE-ID: CVE-2026-23927)

The vulnerability allows a remote user to disclose sensitive information.

The vulnerability exists due to improper input validation in the Agent 2 Oracle plugin when processing the 'service' parameter in TNS connection strings. A remote privileged user can send a specially crafted request to disclose sensitive information.

Exploitation can cause Agent 2 to connect to an attacker-controlled server and leak Oracle database credentials if they are saved in a named session.


Remediation

Install update from vendor's website.