{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-23926","assignerOrgId":"72de3e22-0555-4a0d-ae81-9249e0f0a1e8","state":"PUBLISHED","assignerShortName":"Zabbix","dateReserved":"2026-01-19T14:02:54.327Z","datePublished":"2026-05-06T06:58:51.362Z","dateUpdated":"2026-05-07T03:55:32.552Z"},"containers":{"cna":{"providerMetadata":{"orgId":"72de3e22-0555-4a0d-ae81-9249e0f0a1e8","shortName":"Zabbix","dateUpdated":"2026-05-06T06:58:51.362Z"},"title":"Stored XSS vulnerability in Host navigator widget maintenance tooltip","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-79","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-592","descriptions":[{"lang":"en","value":"CAPEC-592: Stored XSS"}]}],"affected":[{"vendor":"Zabbix","product":"Zabbix","repo":"https://git.zabbix.com/","modules":["Frontend"],"versions":[{"status":"affected","version":"7.0.0","lessThanOrEqual":"7.0.23","changes":[{"at":"7.0.24","status":"unaffected"}],"versionType":"git"},{"status":"affected","version":"7.4.0","lessThanOrEqual":"7.4.7","changes":[{"at":"7.4.8","status":"unaffected"}],"versionType":"git"}],"defaultStatus":"unknown"}],"descriptions":[{"lang":"en","value":"An authenticated (non-super) administrator can create a maintenance period with a JavaScript payload that is executed by any user that opens tooltip for that maintenance period in the Host navigator widget. This can allow the attacker to perform unauthorized actions depending on which user opens the tooltip.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An authenticated (non-super) administrator can create a maintenance period with a JavaScript payload that is executed by any user that opens tooltip for that maintenance period in the Host navigator widget. This can allow the attacker to perform unauthorized actions depending on which user opens the tooltip.</p>"}]}],"references":[{"url":"https://support.zabbix.com/browse/ZBX-27758"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"PASSIVE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"HIGH","baseScore":7.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}}],"configurations":[{"lang":"en","value":"An attacker creating a malicious maintenance period that must then be shown and opened via the Host navigator widget.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An attacker creating a malicious maintenance period that must then be shown and opened via the Host navigator widget.</p>"}]}],"workarounds":[{"lang":"en","value":"Disable the Host navigator widget via Administration -> General -> Modules.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Disable the Host navigator widget via Administration -&gt; General -&gt; Modules.</p>"}]}],"solutions":[{"lang":"en","value":"Update the affected components to their respective fixed versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Update the affected components to their respective fixed versions.</p>"}]}],"credits":[{"lang":"en","value":"Zabbix wants to thank Daniel Santos (@bananabr) for submitting this report on the HackerOne bug bounty platform.","type":"reporter"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 1.0.2"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-06T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2026-23926"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-07T03:55:32.552Z"}}]}}