Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Update the affected components to their respective fixed versions.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-27642 |
|
Wed, 25 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix |
|
| Vendors & Products |
Zabbix
Zabbix zabbix |
Tue, 24 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API. | |
| Title | Agent 2 Docker plugin arbitrary file read via Docker API injection | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2026-03-25T19:25:38.321Z
Reserved: 2026-01-19T14:02:54.327Z
Link: CVE-2026-23924
Updated: 2026-03-25T19:25:34.624Z
Status : Awaiting Analysis
Published: 2026-03-24T19:16:50.893
Modified: 2026-03-25T15:41:58.280
Link: CVE-2026-23924
No data.
OpenCVE Enrichment
Updated: 2026-03-25T21:27:44Z