| CVE ID |
CVE-2025-27232 |
| CVSS score |
6.8 (Medium) |
| CVSS vector |
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| Affected components |
Frontend |
| Summary |
Frontend arbitrary file read in oauth.authorize action |
| Description |
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss. |
| Known attack vectors |
An authenticated Super Admin sending crafted HTTP requests to Zabbix Frontend. |
| Affected and fix version/s |
Affected: 7.4.0 - 7.4.2 → Fixed: 7.4.3 |
| Mitigation |
Update the affected components to their respective fixed versions. |
| Workarounds |
- |
| Acknowledgements |
Zabbix wants to thank o4ncL1 for submitting this report on the HackerOne bug bounty platform. |