CVE-2025-27231
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-08
Assigner: Zabbix
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zabbix | zabbix | From 6.0.0 (inc) to 6.0.41 (exc) |
| zabbix | zabbix | From 7.0.0 (inc) to 7.0.18 (exc) |
| zabbix | zabbix | From 7.2.0 (inc) to 7.2.12 (exc) |
| zabbix | zabbix | From 7.4.0 (inc) to 7.4.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the LDAP 'Bind password' value in a system where, although the password cannot be read after saving, a Super Admin account can leak it by changing the LDAP 'Host' to a rogue LDAP server. To mitigate this risk, the system now resets the 'Bind password' value whenever the 'Host' is changed.
How can this vulnerability impact me? :
If exploited, a Super Admin could leak the LDAP 'Bind password' by redirecting the system to a rogue LDAP server, potentially exposing sensitive authentication credentials. This could lead to unauthorized access or compromise of the LDAP authentication mechanism.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the 'Bind password' value is reset whenever the LDAP 'Host' is changed. Avoid allowing Super Admin accounts to change the LDAP 'Host' to rogue LDAP servers, and monitor for any unauthorized changes to the LDAP 'Host' configuration.