After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
2022-01-13T16:15:08.227
2025-10-30T20:10:35.747
Analyzed
CVSSv3.1: 3.7 (LOW)
AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | zabbix | zabbix | ≤ 5.4.8 | Yes |
| Application | zabbix | zabbix | 6.0.0 | Yes |
| Application | zabbix | zabbix | 6.0.0 | Yes |
| Application | zabbix | zabbix | 6.0.0 | Yes |
| Application | zabbix | zabbix | 6.0.0 | Yes |
| Application | zabbix | zabbix | 6.0.0 | Yes |
| Application | zabbix | zabbix | 6.0.0 | Yes |
| Application | zabbix | zabbix | 6.0.0 | Yes |
| Application | zabbix | zabbix | 6.0.0 | Yes |
| Operating System | fedoraproject | fedora | 34 | Yes |
| Operating System | fedoraproject | fedora | 35 | Yes |
| Operating System | debian | debian_linux | 9.0 | Yes |