Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.

Project Subscriptions

Vendors Products
Advisories

No advisories yet.

Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

No workaround given by the vendor.

History

Wed, 25 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Vendors & Products Zabbix
Zabbix zabbix

Tue, 24 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
Title Agent 2 Docker plugin arbitrary file read via Docker API injection
Weaknesses CWE-88
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2026-03-25T19:25:38.321Z

Reserved: 2026-01-19T14:02:54.327Z

Link: CVE-2026-23924

cve-icon Vulnrichment

Updated: 2026-03-25T19:25:34.624Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T19:16:50.893

Modified: 2026-03-25T15:41:58.280

Link: CVE-2026-23924

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:27:44Z

Weaknesses