For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.
PUBLISHED5.2CWE-488
Insufficient isolation of JavaScript (Duktape) execution context on Zabbix Server
Problem type
Affected products
Zabbix
Zabbix
<= 6.0.40 - AFFECTED
<= 7.0.18 - AFFECTED
<= 7.2.12 - AFFECTED
<= 7.4.2 - AFFECTED
References
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-23919Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-23919",
"assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
"assignerShortName": "Zabbix",
"dateUpdated": "2026-03-24T18:36:16.860Z",
"dateReserved": "2026-01-19T14:02:54.327Z",
"datePublished": "2026-03-24T18:26:43.877Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
"shortName": "Zabbix",
"dateUpdated": "2026-03-24T18:26:43.877Z"
},
"title": "Insufficient isolation of JavaScript (Duktape) execution context on Zabbix Server",
"descriptions": [
{
"lang": "en",
"value": "For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.</p>"
}
]
}
],
"affected": [
{
"vendor": "Zabbix",
"product": "Zabbix",
"modules": [
"Server",
"Proxy"
],
"repo": "https://git.zabbix.com/",
"defaultStatus": "unknown",
"versions": [
{
"version": "6.0.0",
"status": "affected",
"versionType": "git",
"lessThanOrEqual": "6.0.40"
},
{
"version": "7.0.0",
"status": "affected",
"versionType": "git",
"lessThanOrEqual": "7.0.18"
},
{
"version": "7.2.0",
"status": "affected",
"versionType": "git",
"lessThanOrEqual": "7.2.12"
},
{
"version": "7.4.0",
"status": "affected",
"versionType": "git",
"lessThanOrEqual": "7.4.2"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-488: Exposure of Data Element to Wrong Session",
"cweId": "CWE-488",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://support.zabbix.com/browse/ZBX-27638"
}
],
"impacts": [
{
"capecId": "CAPEC-124",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-124: Shared Resource Manipulation"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "A regular Zabbix administrator (non-super) can overwrite some built in JavaScript functions that are then executed for other objects. Alternatively, a regular Zabbix administrator can read global JavaScript variables.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>A regular Zabbix administrator (non-super) can overwrite some built in JavaScript functions that are then executed for other objects. Alternatively, a regular Zabbix administrator can read global JavaScript variables.</p>"
}
]
}
],
"solutions": [
{
"lang": "en",
"value": "Update the affected components to their respective fixed versions. Make sure JavaScript item preprocessing scripts don't store secret data in global variables.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>Update the affected components to their respective fixed versions. Make sure JavaScript item preprocessing scripts don't store secret data in global variables.</p>"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Zabbix wants to thank Yerdan (big_john) for submitting this report on the HackerOne bug bounty platform.",
"type": "reporter"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-24T18:36:16.860Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}