Agent 2 Docker plugin arbitrary file read via Docker API injection (CVE-2026-23924)

XMLWordPrintable

    • Type: Defect (Security)
    • Resolution: Fixed
    • Priority: Major
    • None
    • Affects Version/s: None
    • None

      CVE ID CVE-2026-23924
      CVSS score 6.1 (Medium)
      CVSS vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
      Affected components Agent2
      Summary Agent 2 Docker plugin arbitrary file read via Docker API injection
      Description Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
      Known attack vectors An attacker could query Agent 2 with malicious arguments in the 'docker.container_info' key.
      Affected and fix version/s Affected: 6.0.0 - 6.0.43 → Fixed: 6.0.44
      Affected: 7.0.0 - 7.0.22 → Fixed: 7.0.23
      Affected: 7.4.0 - 7.4.6 → Fixed: 7.4.7
      Mitigation Update the affected components to their respective fixed versions.
      Workarounds -
      Acknowledgements Zabbix wants to thank kelsier from clocktwice.com for submitting this report on the HackerOne bug bounty platform.

            Assignee:
            Zabbix Support Team
            Reporter:
            Janis Nulle
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: