Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
975 articles · 105176 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-23919EXPLOITED
Zabbix · Zabbix

For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-s

Description

For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.

Affected Products

VendorProductVersions
ZabbixZabbix7.4, 7.2, 7.0

References

  • https://support.zabbix.com/browse/ZBX-27638

Related News (2 articles)

Tier B
BSI Advisories1d ago
[NEU] [hoch] Zabbix: Mehrere Schwachstellen
→ No new info (linked only)
Tier B
CERT-FR2d ago
Multiples vulnérabilités dans Zabbix (25 mars 2026)
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-488
Published3/24/2026
Last enriched57m agov4
Tags
ZBX-27639ZBX-27640ZBX-27641ZBX-27642
Trending Score46
Source articles2
Independent2
Info Completeness9/14
Missing: cvss, epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v4
Last enriched 57m ago
v4Tier B57m ago

Updated patch information to reflect multiple new security bulletins and added new tags for the vulnerabilities.

tags
via CERT-FR
v3Tier B8h ago

Updated severity to HIGH, marked as actively exploited, and added new affected versions 7.2 and 7.0.

severityexploitAvailableactivelyExploitedaffectedVersions
via CERT-FR
v2Tier B8h ago

Updated vendor and product to Zabbix, added affected version 7.4, changed severity to HIGH, and noted that exploits are available and actively exploited.

vendorproductaffectedVersionspatchAvailable
via CERT-FR
v19h ago

Initial creation