CVE-2025-27231
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-03

Last updated on: 2025-10-08

Assigner: Zabbix

Description
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-03
Last Modified
2025-10-08
Generated
2026-05-07
AI Q&A
2025-10-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
zabbix zabbix From 6.0.0 (inc) to 6.0.41 (exc)
zabbix zabbix From 7.0.0 (inc) to 7.0.18 (exc)
zabbix zabbix From 7.2.0 (inc) to 7.2.12 (exc)
zabbix zabbix From 7.4.0 (inc) to 7.4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the LDAP 'Bind password' value in a system where, although the password cannot be read after saving, a Super Admin account can leak it by changing the LDAP 'Host' to a rogue LDAP server. To mitigate this risk, the system now resets the 'Bind password' value whenever the 'Host' is changed.


How can this vulnerability impact me? :

If exploited, a Super Admin could leak the LDAP 'Bind password' by redirecting the system to a rogue LDAP server, potentially exposing sensitive authentication credentials. This could lead to unauthorized access or compromise of the LDAP authentication mechanism.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that the 'Bind password' value is reset whenever the LDAP 'Host' is changed. Avoid allowing Super Admin accounts to change the LDAP 'Host' to rogue LDAP servers, and monitor for any unauthorized changes to the LDAP 'Host' configuration.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart