Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-4131-1 | zabbix security update |
![]() |
EUVD-2024-54346 | The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://support.zabbix.com/browse/ZBX-26254 |
![]() ![]() |
Wed, 08 Oct 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Wed, 02 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Apr 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser. | |
Title | Reflected XSS vulnerability in /zabbix.php?action=export.valuemaps | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-04-02T16:31:30.630Z
Reserved: 2024-09-05T07:09:52.197Z
Link: CVE-2024-45699

Updated: 2025-04-02T16:28:25.689Z

Status : Analyzed
Published: 2025-04-02T07:15:41.427
Modified: 2025-10-08T15:32:35.630
Link: CVE-2024-45699

No data.

Updated: 2025-07-12T23:06:27Z