Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Update the affected components to their respective fixed versions.
Vendor Workaround
It is possible to use \A and \z anchors in the regex validation as a workaround.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-27639 |
|
Wed, 25 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix |
|
| Vendors & Products |
Zabbix
Zabbix zabbix |
Tue, 24 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands. | |
| Title | Host and event action script regex validation can be bypassed in certain situations, leading to potential command injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2026-03-26T03:55:29.372Z
Reserved: 2026-01-19T14:02:54.327Z
Link: CVE-2026-23920
Updated: 2026-03-25T19:24:08.184Z
Status : Awaiting Analysis
Published: 2026-03-24T19:16:49.557
Modified: 2026-03-25T15:41:58.280
Link: CVE-2026-23920
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:49:22Z