{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T14:58:42.531","vulnerabilities":[{"cve":{"id":"CVE-2023-26035","sourceIdentifier":"security-advisories@github.com","published":"2023-02-25T02:15:13.550","lastModified":"2024-11-21T07:50:37.893","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33."},{"lang":"es","value":"ZoneMinder es una aplicación de software de circuito cerrado de televisión de código abierto y gratuita para Linux que admite cámaras IP, USB y analógicas. Las versiones anteriores a 1.36.33 y 1.37.33 son vulnerables a la ejecución remota de código no autenticado mediante autorización faltante. No hay verificación de permisos en la acción de instantánea, que espera que una identificación busque un monitor existente, pero en su lugar se le puede pasar un objeto para crear uno nuevo. TriggerOn termina llamando a shell_exec usando la identificación proporcionada. Este problema se solucionó en Este problema se solucionó en las versiones 1.36.33 y 1.37.33."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*","versionEndExcluding":"1.36.33","matchCriteriaId":"A4A5EDFC-FCEB-4982-A3D1-C95814646A27"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*","versionStartIncluding":"1.37.00","versionEndExcluding":"1.37.33","matchCriteriaId":"B1AF3896-BC5B-4FB6-842D-29B621F987E4"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/175675/ZoneMinder-Snapshots-Command-Injection.html","source":"security-advisories@github.com"},{"url":"https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-72rg-h4vf-29gr","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"http://packetstormsecurity.com/files/175675/ZoneMinder-Snapshots-Command-Injection.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-72rg-h4vf-29gr","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}