Home

Description

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue.

PUBLISHED Reserved 2026-02-05 | Published 2026-03-17 | Updated 2026-03-18 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

>= 4.0.0, < 4.14.3
affected

References

github.com/.../wazuh/security/advisories/GHSA-3gm7-962f-fxw5 exploit

github.com/.../wazuh/security/advisories/GHSA-3gm7-962f-fxw5

drive.google.com/...NmHexz8212OVED9O6M_3pI8b6qNI?usp=sharing

cve.org (CVE-2026-25769)

nvd.nist.gov (CVE-2026-25769)

Download JSON