Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
History

Tue, 24 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
Title Agent 2 Docker plugin arbitrary file read via Docker API injection
Weaknesses CWE-88
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2026-03-24T18:30:00.615Z

Reserved: 2026-01-19T14:02:54.327Z

Link: CVE-2026-23924

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-24T19:16:50.893

Modified: 2026-03-24T19:16:50.893

Link: CVE-2026-23924

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.