Description
Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
Published: 2026-03-24
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: arbitrary file read
Action: Patch
AI Analysis

Impact

Zabbix Agent 2 does not sanitize the docker.container_info parameters before requesting information from the Docker daemon. This flaw allows an attacker, who can invoke the agent, to inject values into the Docker archive API and read any file from a running container. The weakness corresponds to CWE‑88, a code injection vulnerability that compromises confidentiality of container data.

Affected Systems

The vulnerability affects the Zabbix Agent 2 Docker plugin. Affected versions are not enumerated in the public data, but any deployment of the unpatched plugin remains vulnerable until an update is applied.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity. EPSS data is unavailable and the issue is not listed in the CISA KEV catalog, suggesting it has not been widely exploited yet. The likely attack vector requires the attacker to be able to invoke the Agent 2 process, which typically means local or privileged access to the host or a trusted source that can communicate with the agent. The impact is limited to the files within the Docker containers; however, each container can contain application code or sensitive configuration, so the compromise could lead to broader system exposure if those containers are critical.

Generated by OpenCVE AI on March 24, 2026 at 20:25 UTC.

Remediation

Vendor Solution

Update the affected components to their respective fixed versions.


OpenCVE Recommended Actions

  • Update Zabbix Agent 2 to the latest version that includes the vendor’s fix.
  • If a patch is unavailable or delayed, disable the Docker plugin or block access to the agent’s Docker-related API endpoints to prevent the injection path.
  • Restrict which clients can invoke Agent 2, ensuring that only authenticated and authorized users have access; review firewall rules and service permissions to limit exposure.

Generated by OpenCVE AI on March 24, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Vendors & Products Zabbix
Zabbix zabbix

Tue, 24 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
Title Agent 2 Docker plugin arbitrary file read via Docker API injection
Weaknesses CWE-88
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2026-03-25T19:25:38.321Z

Reserved: 2026-01-19T14:02:54.327Z

Link: CVE-2026-23924

cve-icon Vulnrichment

Updated: 2026-03-25T19:25:34.624Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T19:16:50.893

Modified: 2026-03-25T15:41:58.280

Link: CVE-2026-23924

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:27:44Z

Weaknesses