First published: Wed Apr 02 2025(Updated: )
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45699 is classified as a medium-severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2024-45699, ensure proper HTML escaping and output encoding of the backurl parameter in the /zabbix.php?action=export.valuemaps endpoint.
CVE-2024-45699 affects users of Zabbix software that utilize the vulnerable endpoint.
CVE-2024-45699 is a Cross-Site Scripting (XSS) vulnerability that allows for the injection of JavaScript payloads.
The impact of CVE-2024-45699 can lead to unauthorized script execution in the context of a user's browser, potentially compromising user data.