Home

Description

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.4.0 to before version 4.14.4, a path traversal vulnerability in Wazuh's cluster synchronization extraction routine allows an authenticated cluster peer to write arbitrary files outside the intended extraction directory on other cluster nodes. This can be escalated to code execution in the Wazuh service context by overwriting Python modules loaded by Wazuh components (proof of concept available as separate attachment). In deployments where the cluster daemon runs with elevated privileges, system-level compromise is possible. This issue has been patched in version 4.14.4.

PUBLISHED Reserved 2026-03-06 | Published 2026-04-29 | Updated 2026-04-29 | Assigner GitHub_M




CRITICAL: 9.0CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-73: External Control of File Name or Path

Product status

>= 4.4.0, < 4.14.4
affected

References

github.com/.../wazuh/security/advisories/GHSA-m8rw-v4f6-8787 exploit

github.com/.../wazuh/security/advisories/GHSA-m8rw-v4f6-8787

github.com/wazuh/wazuh/releases/tag/v4.14.4

cve.org (CVE-2026-30893)

nvd.nist.gov (CVE-2026-30893)

Download JSON