CVE-2025-49642
BaseFortify
Publication date: 2025-12-01
Last updated on: 2026-04-29
Assigner: Zabbix
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zabbix | zabbix_agent | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-426 | The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves library loading on AIX Zabbix Agent builds being hijacked by local users who have write access to the /home/cecuser directory. Essentially, a local user with the ability to write to that directory can manipulate the libraries loaded by the Zabbix Agent, potentially causing it to execute malicious code.
How can this vulnerability impact me? :
The impact of this vulnerability is that a local user with write access to the /home/cecuser directory can hijack the library loading process of the Zabbix Agent, which may lead to privilege escalation or execution of unauthorized code. This could compromise the integrity and security of the system where the Zabbix Agent is running.