{"id":"CVE-2023-32727","details":"An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.","modified":"2026-03-13T07:36:59.736192Z","published":"2023-12-18T10:15:06.937Z","related":["openSUSE-SU-2023:0418-1","openSUSE-SU-2023:0419-1","openSUSE-SU-2024:13535-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html"},{"type":"ADVISORY","url":"https://support.zabbix.com/browse/ZBX-23857"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.0.0"},{"last_affected":"4.0.49"}]},{"events":[{"introduced":"5.0.0"},{"last_affected":"5.0.38"}]},{"events":[{"introduced":"6.0.0"},{"last_affected":"6.0.22"}]},{"events":[{"introduced":"6.4.0"},{"last_affected":"6.4.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.0-alpha1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.0-alpha2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.0-alpha3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.0-alpha6"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-32727.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}