The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

No workaround given by the vendor.

History

Fri, 03 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Oct 2025 11:45:00 +0000

Type Values Removed Values Added
Description The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
Title LDAP 'Bind password' field value can be leaked by a Zabbix Super Admin
Weaknesses CWE-522
References
Metrics cvssV4_0

{'score': 4.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2025-10-03T13:55:51.559Z

Reserved: 2025-02-20T11:40:38.479Z

Link: CVE-2025-27231

cve-icon Vulnrichment

Updated: 2025-10-03T13:55:48.848Z

cve-icon NVD

Status : Received

Published: 2025-10-03T12:15:43.593

Modified: 2025-10-03T12:15:43.593

Link: CVE-2025-27231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.