SQL Injection Vulnerability in Zabbix Affects Low Privilege Users
CVE-2024-36465

8.6HIGH

Key Information:

Vendor

Zabbix

Status
Vendor
CVE Published:
2 April 2025

What is CVE-2024-36465?

CVE-2024-36465 is a security vulnerability found in the Zabbix monitoring software, which is widely used for network monitoring and management. This vulnerability allows low privilege users, specifically those with API access, to exploit SQL injection flaws in the software's API. Such an exploitation can lead to unauthorized manipulation of the underlying database, potentially compromising sensitive data and system integrity. Organizations utilizing Zabbix could face serious risks if the vulnerability is not addressed, as it may facilitate malicious activities and weaken overall security posture.

Technical Details

CVE-2024-36465 involves an SQL injection in the include/classes/api/CApiService.php file within Zabbix. This vulnerability can be triggered through the groupBy parameter, enabling an attacker to execute arbitrary SQL commands on the database. Zabbix’s architecture allows regular users with API access to leverage this flaw, which highlights the need for robust input validation and access controls to prevent misuse.

Potential Impact of CVE-2024-36465

  1. Data Compromise: The exploitation of this vulnerability can lead to unauthorized access to the database, potentially exposing sensitive information and leading to data breaches.

  2. System Integrity Risks: Attackers could manipulate database records or execute harmful queries that disrupt the normal operation of the Zabbix system, jeopardizing service availability and reliability.

  3. Escalation of Attacks: Once an attacker gains access through this vulnerability, they may install further exploits or malware, opening the door for larger-scale attacks against the organization’s network, including data theft and ransomware deployment.

Affected Version(s)

Zabbix 7.0.0 <= 7.0.7

Zabbix 7.2.0 <= 7.2.1

References

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Zabbix wants to thank cynau1t for submitting this report on the HackerOne bug bounty platform
.
CVE-2024-36465 : SQL Injection Vulnerability in Zabbix Affects Low Privilege Users