Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2980-1 | zabbix security update |
Debian DLA |
DLA-3390-1 | zabbix security update |
Debian DLA |
DLA-3909-1 | zabbix security update |
EUVD |
EUVD-2022-29245 | An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victim’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel. |
Solution
To remediate this vulnerability, apply the updates
Workaround
The vulnerability can be exploited only by authenticated users. If an immediate update is not possible, review user access rights to your Zabbix Frontend, be attentive to browser warnings and always check any links you can receive via email or other means of communication, which lead to the actionconf.php page of Zabbix Frontend and contain suspicious parameters with special symbols. If you have clicked on the suspicious link, do not fill out the opened form.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-11-03T21:46:03.748Z
Reserved: 2022-02-02T00:00:00.000Z
Link: CVE-2022-24349
No data.
Status : Modified
Published: 2022-03-09T20:15:08.563
Modified: 2025-11-03T22:15:56.937
Link: CVE-2022-24349
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD