Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
Metrics
Affected Vendors & Products
Fixes
Solution
Update the affected components to their respective fixed versions.
Workaround
Remove smartctl or use strict item key parameter validation with AllowKey/DenyKey.
References
Link | Providers |
---|---|
https://support.zabbix.com/browse/ZBX-26985 |
![]() ![]() |
History
Fri, 12 Sep 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution. | |
Title | Zabbix Agent 2 smartctl plugin RCE vulnerability in Zabbix 5.0. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-09-12T10:31:58.770Z
Reserved: 2025-02-20T11:40:38.480Z
Link: CVE-2025-27234

No data.

Status : Received
Published: 2025-09-12T11:15:31.390
Modified: 2025-09-12T11:15:31.390
Link: CVE-2025-27234

No data.

No data.