Impact
Zabbix Agent 2 does not sanitize the docker.container_info parameters before requesting information from the Docker daemon. This flaw allows an attacker, who can invoke the agent, to inject values into the Docker archive API and read any file from a running container. The weakness corresponds to CWE‑88, a code injection vulnerability that compromises confidentiality of container data.
Affected Systems
The vulnerability affects the Zabbix Agent 2 Docker plugin. Affected versions are not enumerated in the public data, but any deployment of the unpatched plugin remains vulnerable until an update is applied.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity. EPSS data is unavailable and the issue is not listed in the CISA KEV catalog, suggesting it has not been widely exploited yet. The likely attack vector requires the attacker to be able to invoke the Agent 2 process, which typically means local or privileged access to the host or a trusted source that can communicate with the agent. The impact is limited to the files within the Docker containers; however, each container can contain application code or sensitive configuration, so the compromise could lead to broader system exposure if those containers are critical.
OpenCVE Enrichment