An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3909-1 zabbix security update
EUVD EUVD EUVD-2024-19712 An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Wed, 04 Dec 2024 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*

Tue, 13 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
CPEs cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
Vendors & Products Zabbix
Zabbix zabbix
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Aug 2024 13:45:00 +0000


Fri, 09 Aug 2024 10:30:00 +0000

Type Values Removed Values Added
Description An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
Title Remote code execution within ping script
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2025-11-03T21:53:39.703Z

Reserved: 2024-01-05T07:44:01.394Z

Link: CVE-2024-22116

cve-icon Vulnrichment

Updated: 2025-11-03T21:53:39.703Z

cve-icon NVD

Status : Modified

Published: 2024-08-12T13:38:15.863

Modified: 2025-11-03T22:16:46.100

Link: CVE-2024-22116

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.