A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
History

Wed, 02 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Apr 2025 06:15:00 +0000

Type Values Removed Values Added
Description A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
Title SQL injection in Zabbix API
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published: 2025-04-02T06:11:26.928Z

Updated: 2025-04-02T15:09:28.836Z

Reserved: 2024-05-28T11:21:24.947Z

Link: CVE-2024-36465

cve-icon Vulnrichment

Updated: 2025-04-02T15:09:22.427Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-02T06:15:34.130

Modified: 2025-04-02T14:58:07.527

Link: CVE-2024-36465

cve-icon Redhat

No data.