LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-25769

CVE-2026-25769 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: March 18, 2026

Wazuh - Remote Code Execution

Published: March 17, 2026Updated: March 18, 2026PoC AvailableRemote Exploitable

Overview

Wazuh 4.0.0 through 4.14.2 contains a remote code execution caused by deserialization of untrusted data in cluster mode, letting attackers with access to a worker node execute code as root on the master node, exploit requires compromised worker node access.

Severity & Score

Severity: Critical
CVSS Score: 9.1
EPSS Score: 42.1%(Probability of exploitation in next 30 days)

Impact

Attackers with access to a worker node can execute code as root on the master node, leading to full system compromise.

Mitigation

Upgrade to version 4.14.3 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 17, 2026

šŸ”“ CVE-2026-25769 - Critical (9.1) Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using clu... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-25769/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-25769
Severity
Critical
CVSS Score
9.1
Type
insecure_deserialization
Status
unconfirmed
EPSS
42.1%
Social Posts
1

CWE

  • CWE-502

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

EPSS Score

42.1%Probability of exploitation in the next 30 days