Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-23921
PUBLISHED
More InfoOfficial Page
Assigner-Zabbix
Assigner Org ID-72de3e22-0555-4a0d-ae81-9249e0f0a1e8
View Known Exploited Vulnerability (KEV) details
Published At-24 Mar, 2026 | 18:28
Updated At-26 Mar, 2026 | 03:55
Rejected At-
▼CVE Numbering Authority (CNA)
Blind, read-only SQL injection in Zabbix API via sortfield parameter

A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise.

Affected Products
Vendor
ZABBIXZabbix
Product
Zabbix
Repo
https://git.zabbix.com/
Modules
  • API
Default Status
unknown
Versions
Affected
  • From 7.0.0 through 7.0.21 (git)
    • -> unaffectedfrom7.0.22
  • From 7.2.0 through 7.2.14 (git)
    • -> unaffectedfrom7.2.15
  • From 7.4.0 through 7.4.5 (git)
    • -> unaffectedfrom7.4.6
Problem Types
TypeCWE IDDescription
CWECWE-89CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Type: CWE
CWE ID: CWE-89
Description: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-7CAPEC-7: Blind SQL Injection
CAPEC ID: CAPEC-7
Description: CAPEC-7: Blind SQL Injection
Solutions

Update the affected components to their respective fixed versions.

Configurations

To exploit this vulnerability an attacker needs access to a Zabbix account with API access.

Workarounds

Exploits

Credits

reporter
Zabbix wants to thank SeaWind for submitting this report on the HackerOne bug bounty platform.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.zabbix.com/browse/ZBX-27640
N/A
Hyperlink: https://support.zabbix.com/browse/ZBX-27640
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found