Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Update the affected components to their respective fixed versions.
Workaround
No workaround given by the vendor.
Fri, 06 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix frontend
|
|
| CPEs | cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zabbix frontend
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 12 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 01 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix |
|
| Vendors & Products |
Zabbix
Zabbix zabbix |
Mon, 01 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss. | |
| Title | Frontend arbitrary file read in oauth.authorize action | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-12-01T14:38:51.199Z
Reserved: 2025-02-20T11:40:38.479Z
Link: CVE-2025-27232
Updated: 2025-12-01T14:38:48.381Z
Status : Analyzed
Published: 2025-12-01T13:16:00.560
Modified: 2026-02-06T15:23:18.657
Link: CVE-2025-27232
OpenCVE Enrichment
Updated: 2025-12-01T21:27:32Z