Home

Description

Nagios XI versions prior to 5.7.2 allow PHP files to be uploaded to the Audio Import directory and executed from that location. The upload handler did not properly restrict file types or enforce storage outside of the webroot, and the web server permitted execution within the upload directory. An authenticated attacker with access to the audio import feature could upload a crafted PHP file and then request it to achieve remote code execution with the privileges of the application service.

PUBLISHED Reserved 2025-10-30 | Published 2025-10-30 | Updated 2025-10-31 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

Any version before 5.7.2
affected

Credits

TactiFail finder

References

www.nagios.com/changelog/nagios-xi/ release-notes patch

www.vulncheck.com/...-file-upload-via-audio-import-directory third-party-advisory

cve.org (CVE-2020-36863)

nvd.nist.gov (CVE-2020-36863)

Download JSON