Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.

Subscriptions

No data.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

It is possible to use \A and \z anchors in the regex validation as a workaround.

History

Tue, 24 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.
Title Host and event action script regex validation can be bypassed in certain situations, leading to potential command injection
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2026-03-24T18:27:52.882Z

Reserved: 2026-01-19T14:02:54.327Z

Link: CVE-2026-23920

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-24T19:16:49.557

Modified: 2026-03-24T19:16:49.557

Link: CVE-2026-23920

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses