Metrics
Affected Vendors & Products
Solution
Update the affected components to their respective fixed versions.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://support.zabbix.com/browse/ZBX-27062 |
![]() ![]() |
Fri, 03 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Oct 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change. | |
Title | LDAP 'Bind password' field value can be leaked by a Zabbix Super Admin | |
Weaknesses | CWE-522 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-10-03T13:55:51.559Z
Reserved: 2025-02-20T11:40:38.479Z
Link: CVE-2025-27231

Updated: 2025-10-03T13:55:48.848Z

Status : Received
Published: 2025-10-03T12:15:43.593
Modified: 2025-10-03T12:15:43.593
Link: CVE-2025-27231

No data.

No data.