{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T19:13:03.971","vulnerabilities":[{"cve":{"id":"CVE-2024-22120","sourceIdentifier":"security@zabbix.com","published":"2024-05-17T10:15:07.363","lastModified":"2025-10-08T15:57:03.240","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection."},{"lang":"es","value":"El servidor Zabbix puede realizar la ejecución de comandos para scripts configurados. Después de ejecutar el comando, la entrada de auditoría se agrega al \"Registro de auditoría\". Debido a que el campo \"clientip\" no está sanitizado, es posible inyectar SQL en \"clientip\" y explotar la inyección SQL ciega basada en el tiempo."}],"metrics":{"cvssMetricV31":[{"source":"security@zabbix.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@zabbix.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.28","matchCriteriaId":"D724C8AD-C793-4602-8B1B-33B54A0A847A"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"6.4.13","matchCriteriaId":"8507A896-08E2-4A4F-B499-66BDA79CAA32"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*","matchCriteriaId":"93EB5757-7F98-4428-9616-C30A647A6612"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*","matchCriteriaId":"DA00BDB5-433F-44E5-87AC-DA01C64B5DB3"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*","matchCriteriaId":"98C46C92-9D86-45CD-88FE-DFBB5502BB88"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*","matchCriteriaId":"B568E6DD-A6D1-4402-BB40-7DA2596A5BC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*","matchCriteriaId":"B9C3673B-8459-4C63-8E90-724D1D42A8BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*","matchCriteriaId":"7C9F6957-7526-4852-A579-DE556DBFAA97"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*","matchCriteriaId":"81A7A191-93DE-4C5D-963E-E8890FF7AACA"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*","matchCriteriaId":"AEE202D5-3C88-43A5-9328-FC78D0B9B8CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*","matchCriteriaId":"F88BFB75-7951-47D5-941F-3839E9E31FFA"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*","matchCriteriaId":"8216247E-C160-4D2C-906E-9D8CD731B5C2"}]}]}],"references":[{"url":"https://support.zabbix.com/browse/ZBX-24505","source":"security@zabbix.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://support.zabbix.com/browse/ZBX-24505","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}