First published: Wed Apr 02 2025(Updated: )
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36465 has a low severity rating due to the requirement of low privileged API access.
To mitigate CVE-2024-36465, restrict API access to trusted users and ensure proper input validation on the groupBy parameter.
CVE-2024-36465 is identified as an SQL injection vulnerability.
Regular Zabbix users with API access are affected by CVE-2024-36465.
CVE-2024-36465 can potentially allow an attacker to execute arbitrary SQL commands, leading to unauthorized data access.