Home

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

PUBLISHED Reserved 2025-04-15 | Published 2025-12-16 | Updated 2025-12-18 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-732 Incorrect Permission Assignment for Critical Resource

Product status

Default status
unaffected

Any version before 2026R1.1
affected

Credits

M. Cory Billington of theyhack.me finder

References

www.nagios.com/changelog/nagios-xi/2026r1-1/ release-notes patch

www.vulncheck.com/...writable-php-include-executed-with-sudo third-party-advisory

cve.org (CVE-2025-34288)

nvd.nist.gov (CVE-2025-34288)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.