Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://support.zabbix.com/browse/ZBX-26985 |
![]() ![]() |
History
Mon, 15 Sep 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zabbix
Zabbix zabbix Zabbix zabbix-agent Zabbix zabbix-agent2 Zabbix zabbix Agentd |
|
Vendors & Products |
Zabbix
Zabbix zabbix Zabbix zabbix-agent Zabbix zabbix-agent2 Zabbix zabbix Agentd |
Fri, 12 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 12 Sep 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution. | |
Title | Zabbix Agent 2 smartctl plugin RCE vulnerability in Zabbix 5.0. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Zabbix
Published: 2025-09-12T10:31:58.770Z
Updated: 2025-09-13T03:55:34.603Z
Reserved: 2025-02-20T11:40:38.480Z
Link: CVE-2025-27234

Updated: 2025-09-12T15:16:50.450Z

Status : Awaiting Analysis
Published: 2025-09-12T11:15:31.390
Modified: 2025-09-15T15:21:42.937
Link: CVE-2025-27234

No data.