CVE-2024-45699

The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
References
Link Resource
https://support.zabbix.com/browse/ZBX-26254 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*

History

08 Oct 2025, 15:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
References () https://support.zabbix.com/browse/ZBX-26254 - () https://support.zabbix.com/browse/ZBX-26254 - Vendor Advisory
Summary
  • (es) El endpoint /zabbix.php?action=export.valuemaps presenta una vulnerabilidad de Cross-Site Scripting a través del parámetro backurl. Esto se debe a la reflexión de datos proporcionados por el usuario sin el escape HTML ni la codificación de salida adecuados. Como resultado, se puede inyectar un payload de JavaScript en el endpoint mencionado, lo que provoca su ejecución en el contexto del navegador de la víctima.
First Time Zabbix zabbix
Zabbix

02 Apr 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-02 07:15

Updated : 2025-10-08 15:32


NVD link : CVE-2024-45699

Mitre link : CVE-2024-45699

CVE.ORG link : CVE-2024-45699


JSON object : View

Products Affected

zabbix

  • zabbix
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')