An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
Advisories

No advisories yet.

Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

No workaround given by the vendor.

History

Mon, 01 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Vendors & Products Zabbix
Zabbix zabbix

Mon, 01 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 13:30:00 +0000

Type Values Removed Values Added
Description An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
Title Frontend DoS vulnerability due to asymmetric resource consumption
Weaknesses CWE-405
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2025-12-01T14:34:20.496Z

Reserved: 2025-06-09T12:23:32.445Z

Link: CVE-2025-49643

cve-icon Vulnrichment

Updated: 2025-12-01T14:34:11.678Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-01T14:16:06.007

Modified: 2025-12-01T15:39:33.110

Link: CVE-2025-49643

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-01T21:27:33Z