CVE-2024-36465

A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
References
Link Resource
https://support.zabbix.com/browse/ZBX-26257 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.8:rc1:*:*:*:*:*:*

History

08 Oct 2025, 15:31

Type Values Removed Values Added
References () https://support.zabbix.com/browse/ZBX-26257 - () https://support.zabbix.com/browse/ZBX-26257 - Vendor Advisory
Summary
  • (es) Un usuario de Zabbix con privilegios bajos (normal) y acceso a la API puede utilizar la vulnerabilidad de inyección SQL en include/classes/api/CApiService.php para ejecutar comandos SQL arbitrarios a través del parámetro groupBy.
First Time Zabbix zabbix
Zabbix
CPE cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.8:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

02 Apr 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-02 06:15

Updated : 2025-10-08 15:31


NVD link : CVE-2024-36465

Mitre link : CVE-2024-36465

CVE.ORG link : CVE-2024-36465


JSON object : View

Products Affected

zabbix

  • zabbix
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')