An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-43900 An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.
Fixes

Solution

To remediate this vulnerability, apply the updates


Workaround

The vulnerability can be exploited only by authenticated users. If an immediate update is not possible, review user access rights to your Zabbix Frontend, be attentive to browser warnings and always check any links you can receive via email or other means of communication, which lead to Zabbix Frontend and contain suspicious parameters with special symbols.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0104}

epss

{'score': 0.01162}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2024-09-16T19:19:37.577Z

Reserved: 2022-09-13T00:00:00

Link: CVE-2022-40626

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-09-14T11:15:53.473

Modified: 2024-11-21T07:21:44.230

Link: CVE-2022-40626

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.