Project Subscriptions
No data.
No advisories yet.
Solution
Update the affected components to their respective fixed versions. Make sure JavaScript item preprocessing scripts don't store secret data in global variables.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-27638 |
|
Tue, 24 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>. | |
| Title | Insufficient isolation of JavaScript (Duktape) execution context on Zabbix Server | |
| Weaknesses | CWE-488 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2026-03-24T18:36:16.860Z
Reserved: 2026-01-19T14:02:54.327Z
Link: CVE-2026-23919
Updated: 2026-03-24T18:36:13.549Z
Status : Received
Published: 2026-03-24T19:16:49.290
Modified: 2026-03-24T19:16:49.290
Link: CVE-2026-23919
No data.
OpenCVE Enrichment
No data.