2026-03-24 18:26CVE-2026-23919Zabbix
PUBLISHED5.2CWE-488

Insufficient isolation of JavaScript (Duktape) execution context on Zabbix Server

For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.

Problem type

Affected products

Zabbix

Zabbix

<= 6.0.40 - AFFECTED

<= 7.0.18 - AFFECTED

<= 7.2.12 - AFFECTED

<= 7.4.2 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-23919
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-23919",
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "dateUpdated": "2026-03-24T18:36:16.860Z",
    "dateReserved": "2026-01-19T14:02:54.327Z",
    "datePublished": "2026-03-24T18:26:43.877Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix",
        "dateUpdated": "2026-03-24T18:26:43.877Z"
      },
      "title": "Insufficient isolation of JavaScript (Duktape) execution context on Zabbix Server",
      "descriptions": [
        {
          "lang": "en",
          "value": "For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information &lt;a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'&gt;in Zabbix documentation&lt;/a&gt;.</p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Zabbix",
          "product": "Zabbix",
          "modules": [
            "Server",
            "Proxy"
          ],
          "repo": "https://git.zabbix.com/",
          "defaultStatus": "unknown",
          "versions": [
            {
              "version": "6.0.0",
              "status": "affected",
              "versionType": "git",
              "lessThanOrEqual": "6.0.40"
            },
            {
              "version": "7.0.0",
              "status": "affected",
              "versionType": "git",
              "lessThanOrEqual": "7.0.18"
            },
            {
              "version": "7.2.0",
              "status": "affected",
              "versionType": "git",
              "lessThanOrEqual": "7.2.12"
            },
            {
              "version": "7.4.0",
              "status": "affected",
              "versionType": "git",
              "lessThanOrEqual": "7.4.2"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-488: Exposure of Data Element to Wrong Session",
              "cweId": "CWE-488",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-27638"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-124",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-124: Shared Resource Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "A regular Zabbix administrator (non-super) can overwrite some built in JavaScript functions that are then executed for other objects. Alternatively, a regular Zabbix administrator can read global JavaScript variables.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>A regular Zabbix administrator (non-super) can overwrite some built in JavaScript functions that are then executed for other objects. Alternatively, a regular Zabbix administrator can read global JavaScript variables.</p>"
            }
          ]
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update the affected components to their respective fixed versions. Make sure JavaScript item preprocessing scripts don't store secret data in global variables.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>Update the affected components to their respective fixed versions. Make sure JavaScript item preprocessing scripts don't store secret data in global variables.</p>"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Zabbix wants to thank Yerdan (big_john) for submitting this report on the HackerOne bug bounty platform.",
          "type": "reporter"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2026-03-24T18:36:16.860Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}