Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.

Project Subscriptions

Vendors Products
Zabbix-agent Subscribe
Zabbix-agent2 Subscribe
Zabbix Agentd Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4473-1 zabbix security update
EUVD EUVD EUVD-2025-29036 Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

Remove smartctl or use strict item key parameter validation with AllowKey/DenyKey.

History

Sun, 08 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
References

Mon, 15 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Zabbix zabbix-agent
Zabbix zabbix-agent2
Zabbix zabbix Agentd
Vendors & Products Zabbix
Zabbix zabbix
Zabbix zabbix-agent
Zabbix zabbix-agent2
Zabbix zabbix Agentd

Fri, 12 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
Description Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
Title Zabbix Agent 2 smartctl plugin RCE vulnerability in Zabbix 5.0.
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2026-02-08T17:07:21.136Z

Reserved: 2025-02-20T11:40:38.480Z

Link: CVE-2025-27234

cve-icon Vulnrichment

Updated: 2026-02-08T17:07:21.136Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-12T11:15:31.390

Modified: 2026-02-08T17:15:57.203

Link: CVE-2025-27234

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-15T10:43:55Z

Weaknesses