Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

Remove smartctl or use strict item key parameter validation with AllowKey/DenyKey.

History

Fri, 12 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
Description Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
Title Zabbix Agent 2 smartctl plugin RCE vulnerability in Zabbix 5.0.
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2025-09-12T10:31:58.770Z

Reserved: 2025-02-20T11:40:38.480Z

Link: CVE-2025-27234

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-12T11:15:31.390

Modified: 2025-09-12T11:15:31.390

Link: CVE-2025-27234

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.