Uploaded image for project: 'ZABBIX BUGS AND ISSUES'
  1. ZABBIX BUGS AND ISSUES
  2. ZBX-27282

Frontend arbitrary file read in oauth.authorize action (CVE-2025-27232)

XMLWordPrintable

    • Icon: Defect (Security) Defect (Security)
    • Resolution: Fixed
    • Icon: Minor Minor
    • None
    • None
    • Frontend (F)
    • None

      CVE ID CVE-2025-27232
      CVSS score 6.8 (Medium)
      CVSS vector CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
      Affected components Frontend
      Summary Frontend arbitrary file read in oauth.authorize action
      Description An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
      Known attack vectors An authenticated Super Admin sending crafted HTTP requests to Zabbix Frontend.
      Affected and fix version/s Affected: 7.4.0 - 7.4.2 → Fixed: 7.4.3
      Mitigation Update the affected components to their respective fixed versions.
      Workarounds -
      Acknowledgements Zabbix wants to thank o4ncL1 for submitting this report on the HackerOne bug bounty platform.

            zabbix.support Zabbix Support Team
            jnulle Janis Nulle
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: