Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Update the affected components to their respective fixed versions.
Vendor Workaround
Remove smartctl or use strict item key parameter validation with AllowKey/DenyKey.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4473-1 | zabbix security update |
EUVD |
EUVD-2025-29036 | Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution. |
Sun, 08 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 15 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix Zabbix zabbix-agent Zabbix zabbix-agent2 Zabbix zabbix Agentd |
|
| Vendors & Products |
Zabbix
Zabbix zabbix Zabbix zabbix-agent Zabbix zabbix-agent2 Zabbix zabbix Agentd |
Fri, 12 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution. | |
| Title | Zabbix Agent 2 smartctl plugin RCE vulnerability in Zabbix 5.0. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2026-02-26T17:48:39.389Z
Reserved: 2025-02-20T11:40:38.480Z
Link: CVE-2025-27234
Updated: 2026-02-08T17:07:21.136Z
Status : Deferred
Published: 2025-09-12T11:15:31.390
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-27234
No data.
OpenCVE Enrichment
Updated: 2025-09-15T10:43:55Z
Debian DLA
EUVD