Arbitrary Command Injection Affecting github.com/zabbix/zabbix/src/go/plugins/smart package, versions >=6.0.0 <6.0.40>=7.0.0 <7.0.11>=7.2.0 <7.2.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMZABBIXZABBIXSRCGOPLUGINSSMART-13102983
  • published27 Sept 2025
  • disclosed12 Sept 2025
  • creditJanis Nulle

Introduced: 12 Sep 2025

NewCVE-2025-27233  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade github.com/zabbix/zabbix/src/go/plugins/smart to version 6.0.40, 7.0.11, 7.2.5 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Command Injection via improper sanitization of parameters in the smart.disk.get process. An attacker can inject arbitrary arguments into the smartctl command by supplying crafted input, potentially leading to the exposure of sensitive information such as NTLMv2 hashes from Windows systems. This vulnerability can be mitigated by removing smartctl or using strict item key parameter validation with AllowKey/DenyKey.

CVSS Base Scores

version 4.0
version 3.1