| Name | CVE-2025-49643 |
| Description | An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1121841 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| zabbix (PTS) | bullseye | 1:5.0.8+dfsg-1 | vulnerable |
| bullseye (security) | 1:5.0.46+dfsg-1+deb11u1 | vulnerable |
| bookworm | 1:6.0.14+dfsg-1 | vulnerable |
| sid, trixie | 1:7.0.10+dfsg-2 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| zabbix | source | (unstable) | (unfixed) | | | 1121841 |
Notes
https://support.zabbix.com/browse/ZBX-27284
Fixed by: https://github.com/zabbix/zabbix/commit/b4757c1eaa571abbf0aa6fa2fe2e77ccf4c205f8 (7.0.19rc1)
Fixed by: https://github.com/zabbix/zabbix/commit/aeada86d3c8231e1e173c6a7ac19ea60bf899b86 (6.0.42rc1)
Fixed in: 6.0.42, 7.0.19, 7.2.13, 7.4.3