CVE-2023-32725

The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.6 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
ZabbixCNA
9.6 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
VendorProductVersion
zabbixzabbix_server
6.0.0 ≤
𝑥
≤ 6.0.21
zabbixzabbix_server
6.4.0 ≤
𝑥
≤ 6.4.6
zabbixzabbix_server
7.0.0:alpha1
zabbixzabbix_server
7.0.0:alpha2
zabbixzabbix_server
7.0.0:alpha3
zabbixfrontend
6.0.0 ≤
𝑥
≤ 6.0.21
zabbixfrontend
6.4.0 ≤
𝑥
≤ 6.4.6
zabbixfrontend
7.0.0:alpha1
zabbixfrontend
7.0.0:alpha2
zabbixfrontend
7.0.0:alpha3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
zabbix
bullseye
1:5.0.8+dfsg-1
not-affected
buster
not-affected
bullseye (security)
1:5.0.45+dfsg-1+deb11u1
fixed
bookworm
vulnerable
sid
1:7.0.6+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
zabbix
noble
dne
mantic
ignored
lunar
ignored
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected