Description
A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session.
Published: 2026-05-06
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A user with access to Zabbix Agent 2 can inject an Oracle TNS connection string through the 'service' parameter, causing the agent to connect to an attacker‑controlled server and potentially leak Oracle database credentials that are stored in a named session. The vulnerability, classified as CWE‑522 (improper restriction of credentials use), can lead to credential disclosure and a compromise of the underlying database. The CVSS score of 5.1 reflects moderate severity, but the impact could be serious if credentials are exposed.

Affected Systems

The flaw affects Zabbix Agent 2 installations that use the Oracle monitoring plugin. The vendor did not publish specific affected component versions, so any Agent 2 build prior to the patch that accepts the vulnerable 'service' parameter is susceptible. Named Oracle sessions configured in the agent's configuration files are the typical vectors for credential storage.

Risk and Exploitability

The vulnerability is not listed in the CISA KEV catalog and its EPSS score is unavailable, indicating that known exploitation activity is not documented. Attackers would need the ability to instruct Agent 2 to use a malicious service string, which generally requires permission to modify agent configuration or to submit monitoring data. Therefore, the risk is largely confined to environments where the attacker holds configuration or monitoring privileges for the agent. If such privileges exist, the attacker could redirect the agent to a malicious server and exfiltrate stored credentials.

Generated by OpenCVE AI on May 6, 2026 at 08:51 UTC.

Remediation

Vendor Solution

Update the affected components to their respective fixed versions.


Vendor Workaround

Don't use named sessions for Oracle database monitoring.


OpenCVE Recommended Actions

  • Update Zabbix Agent 2 to the latest version that removes the vulnerable parameter handling.
  • Remove or disable any named Oracle sessions from the agent configuration to stop credential leakage.
  • Restrict access to Agent 2 configuration so that only trusted administrators can alter connection strings.

Generated by OpenCVE AI on May 6, 2026 at 08:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Vendors & Products Zabbix
Zabbix zabbix

Wed, 06 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session.
Title Agent 2 Oracle plugin TNS connection string injection via the 'service' parameter
Weaknesses CWE-522
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2026-05-06T06:59:42.854Z

Reserved: 2026-01-19T14:02:54.327Z

Link: CVE-2026-23927

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T08:16:02.940

Modified: 2026-05-06T08:16:02.940

Link: CVE-2026-23927

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T09:00:10Z

Weaknesses