Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1100 articles · 105223 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23919EXPLOITED
Zabbix · Zabbix

For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-s

Description

For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.

Affected Products

VendorProductVersions
ZabbixZabbix7.4, 7.2, 7.0

References

  • https://support.zabbix.com/browse/ZBX-27638

Related News (2 articles)

Tier B
BSI Advisories1d ago
[NEU] [hoch] Zabbix: Mehrere Schwachstellen
→ No new info (linked only)
Tier B
CERT-FR2d ago
Multiples vulnérabilités dans Zabbix (25 mars 2026)
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-488
Published3/24/2026
Last enriched3h agov4
Tags
ZBX-27639ZBX-27640ZBX-27641ZBX-27642
Trending Score45
Source articles2
Independent2
Info Completeness9/14
Missing: cvss, epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v4
Last enriched 3h ago
v4Tier B3h ago

Updated patch information to reflect multiple new security bulletins and added new tags for the vulnerabilities.

tags
via CERT-FR
v3Tier B10h ago

Updated severity to HIGH, marked as actively exploited, and added new affected versions 7.2 and 7.0.

severityexploitAvailableactivelyExploitedaffectedVersions
via CERT-FR
v2Tier B10h ago

Updated vendor and product to Zabbix, added affected version 7.4, changed severity to HIGH, and noted that exploits are available and actively exploited.

vendorproductaffectedVersionspatchAvailable
via CERT-FR
v111h ago

Initial creation