Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Update the affected components to their respective fixed versions.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-27641 |
|
Wed, 25 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix |
|
| Vendors & Products |
Zabbix
Zabbix zabbix |
Tue, 24 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated attacker can exploit the Frontend 'validate' action to blindly instantiate arbitrary PHP classes. The impact depends on environment setup but appears limited at this time. | |
| Title | Unauthenticated arbitrary PHP class instantiation | |
| Weaknesses | CWE-470 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2026-03-25T19:25:01.128Z
Reserved: 2026-01-19T14:02:54.327Z
Link: CVE-2026-23923
Updated: 2026-03-25T19:24:58.974Z
Status : Awaiting Analysis
Published: 2026-03-24T19:16:50.740
Modified: 2026-03-25T15:41:58.280
Link: CVE-2026-23923
No data.
OpenCVE Enrichment
Updated: 2026-03-25T21:27:45Z