Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (11)
Vulnerability Summary Aliases
VCID-18fv-tqjq-p3ce An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victim’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel. CVE-2022-24349
VCID-2hd4-rbph-5qd8 An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts. CVE-2022-23133
VCID-69kr-fmzb-nbdr Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution. CVE-2025-27234
VCID-8cpy-mqfn-y3f9 An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. CVE-2022-35230
VCID-9aju-xvg1-n7e5 An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. CVE-2022-35229
VCID-a13m-gsde-jyf3 An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend. CVE-2022-40626
VCID-f797-yxay-bffg After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend. CVE-2022-23134
VCID-gbn9-b2t2-5fbs During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level CVE-2022-23132
VCID-mggj-rvdd-eqc6 An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks. CVE-2022-24917
VCID-qhxc-w75p-kqaj An authenticated user can create a link with reflected Javascript code inside it for graphs’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks. CVE-2022-24919
VCID-uu3f-3rbn-9fad An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks. CVE-2022-24918

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:56:03.242499+00:00 Debian Importer Fixing VCID-18fv-tqjq-p3ce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:47:00.764344+00:00 Debian Importer Fixing VCID-gbn9-b2t2-5fbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:02.601394+00:00 Debian Importer Fixing VCID-mggj-rvdd-eqc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:48.533583+00:00 Debian Importer Fixing VCID-9aju-xvg1-n7e5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:54.575012+00:00 Debian Importer Fixing VCID-8cpy-mqfn-y3f9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:48.974637+00:00 Debian Importer Fixing VCID-f797-yxay-bffg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:48.723837+00:00 Debian Importer Fixing VCID-qhxc-w75p-kqaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:19.110140+00:00 Debian Importer Fixing VCID-69kr-fmzb-nbdr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:37.874631+00:00 Debian Importer Fixing VCID-uu3f-3rbn-9fad https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:35.697412+00:00 Debian Importer Fixing VCID-2hd4-rbph-5qd8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:02:06.241455+00:00 Debian Importer Fixing VCID-a13m-gsde-jyf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:08:44.938695+00:00 Debian Importer Fixing VCID-18fv-tqjq-p3ce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:10.513114+00:00 Debian Importer Fixing VCID-gbn9-b2t2-5fbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:03.264098+00:00 Debian Importer Fixing VCID-mggj-rvdd-eqc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:43.935590+00:00 Debian Importer Fixing VCID-9aju-xvg1-n7e5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:45.725276+00:00 Debian Importer Fixing VCID-8cpy-mqfn-y3f9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:12.177750+00:00 Debian Importer Fixing VCID-f797-yxay-bffg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:09.622795+00:00 Debian Importer Fixing VCID-qhxc-w75p-kqaj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:29.294050+00:00 Debian Importer Fixing VCID-69kr-fmzb-nbdr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:17.627421+00:00 Debian Importer Fixing VCID-uu3f-3rbn-9fad https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:33.885005+00:00 Debian Importer Fixing VCID-2hd4-rbph-5qd8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:03:28.428429+00:00 Debian Importer Fixing VCID-a13m-gsde-jyf3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:59:12.412663+00:00 Debian Importer Fixing VCID-69kr-fmzb-nbdr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.248764+00:00 Debian Importer Fixing VCID-a13m-gsde-jyf3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.195437+00:00 Debian Importer Fixing VCID-8cpy-mqfn-y3f9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.138360+00:00 Debian Importer Fixing VCID-9aju-xvg1-n7e5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.086752+00:00 Debian Importer Fixing VCID-qhxc-w75p-kqaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.039847+00:00 Debian Importer Fixing VCID-uu3f-3rbn-9fad https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:08.992683+00:00 Debian Importer Fixing VCID-mggj-rvdd-eqc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:08.945651+00:00 Debian Importer Fixing VCID-18fv-tqjq-p3ce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:08.898653+00:00 Debian Importer Fixing VCID-f797-yxay-bffg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:08.851453+00:00 Debian Importer Fixing VCID-2hd4-rbph-5qd8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:08.803437+00:00 Debian Importer Fixing VCID-gbn9-b2t2-5fbs https://security-tracker.debian.org/tracker/data/json 38.1.0