CVE-2024-45699

Name
CVE-2024-45699
Description
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security@zabbix.com https://support.zabbix.com/browse/ZBX-26254
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2025/04/msg00027.html

Match rules

CPE URI Source package Min version Max version
zabbix >= 6.0.0 <= 6.0.36
zabbix >= 6.4.0 <= 6.4.20
zabbix >= 7.0.0 <= 7.0.6

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
zabbix edge-community 7.0.1-r0 Kevin Daudt <kdaudt@alpinelinux.org> possibly vulnerable
zabbix 3.22-community 7.0.1-r0 None possibly vulnerable