Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Update the affected components to their respective fixed versions.
Vendor Workaround
Don't use named sessions for Oracle database monitoring.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-27759 |
|
Wed, 06 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix |
|
| Vendors & Products |
Zabbix
Zabbix zabbix |
Wed, 06 May 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session. | |
| Title | Agent 2 Oracle plugin TNS connection string injection via the 'service' parameter | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2026-05-06T13:00:17.802Z
Reserved: 2026-01-19T14:02:54.327Z
Link: CVE-2026-23927
Updated: 2026-05-06T13:00:12.475Z
Status : Awaiting Analysis
Published: 2026-05-06T08:16:02.940
Modified: 2026-05-07T14:56:04.523
Link: CVE-2026-23927
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:00:10Z