Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
Advisories

No advisories yet.

Fixes

Solution

Update the affected components to their respective fixed versions.


Workaround

No workaround given by the vendor.

History

Tue, 24 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
Title Agent 2 Docker plugin arbitrary file read via Docker API injection
Weaknesses CWE-88
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2026-03-24T18:30:00.615Z

Reserved: 2026-01-19T14:02:54.327Z

Link: CVE-2026-23924

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-24T19:16:50.893

Modified: 2026-03-24T19:16:50.893

Link: CVE-2026-23924

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses