๐Ÿ” CVE Alert

CVE-2026-23919

UNKNOWN 0.0

Insufficient isolation of JavaScript (Duktape) execution context on Zabbix Server

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.

CWE CWE-488
Vendor zabbix
Product zabbix
Published Mar 24, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for zabbix zabbix

Be the first to know when new unknown vulnerabilities affecting zabbix zabbix are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Zabbix / Zabbix
6.0.0 โ‰ค 6.0.40 7.0.0 โ‰ค 7.0.18 7.2.0 โ‰ค 7.2.12 7.4.0 โ‰ค 7.4.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
support.zabbix.com: https://support.zabbix.com/browse/ZBX-27638

Credits

๐Ÿ” Zabbix wants to thank Yerdan (big_john) for submitting this report on the HackerOne bug bounty platform.