#VU124617 Command injection in Zabbix - CVE-2026-23920
Published: March 25, 2026
Zabbix
Zabbix
Description
The vulnerability allows a remote user to execute arbitrary code.
The vulnerability exists due to improper input validation in host and event action script processing when handling regex validation in multiline mode. A remote user can send a specially crafted script input containing a newline character to bypass ^ and $ anchors in administrator-defined regex patterns and inject arbitrary shell commands.
Successful exploitation requires the attacker to have script execution permissions and the target system to use ^ and $ anchors in its input validation regex.