SQL Injection Vulnerability in Zabbix API by Zabbix
CVE-2026-23921

8.7HIGH

Key Information:

Vendor

Zabbix

Status
Vendor
CVE Published:
24 March 2026

What is CVE-2026-23921?

A low privilege user in Zabbix with API access can trigger a blind SQL injection vulnerability located within the API service. By manipulating the 'sortfield' parameter, the attacker can perform arbitrary SQL selects. Although the query results are not directly returned, the attacker can use time-based techniques to exfiltrate sensitive database information. This could lead to potential disclosure of session identifiers and the risk of compromising administrator accounts.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Zabbix 7.0.0 <= 7.0.21

Zabbix 7.2.0 <= 7.2.14

Zabbix 7.4.0 <= 7.4.5

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Zabbix wants to thank SeaWind for submitting this report on the HackerOne bug bounty platform.
.