An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
Advisories

No advisories yet.

Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

No workaround given by the vendor.

History

Mon, 01 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Vendors & Products Zabbix
Zabbix zabbix

Mon, 01 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 13:00:00 +0000

Type Values Removed Values Added
Description An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
Title Frontend arbitrary file read in oauth.authorize action
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2025-12-01T14:38:51.199Z

Reserved: 2025-02-20T11:40:38.479Z

Link: CVE-2025-27232

cve-icon Vulnrichment

Updated: 2025-12-01T14:38:48.381Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-01T13:16:00.560

Modified: 2025-12-01T15:39:33.110

Link: CVE-2025-27232

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-01T21:27:32Z