CVE-2026-25769 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: March 18, 2026
Wazuh - Remote Code Execution
Overview
Wazuh 4.0.0 through 4.14.2 contains a remote code execution caused by deserialization of untrusted data in cluster mode, letting attackers with access to a worker node execute code as root on the master node, exploit requires compromised worker node access.
Severity & Score
Impact
Attackers with access to a worker node can execute code as root on the master node, leading to full system compromise.
Mitigation
Upgrade to version 4.14.3 or later.
References
Social Media Activity(1 post)
š“ CVE-2026-25769 - Critical (9.1) Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using clu... š https://www.thehackerwire.com/vulnerability/CVE-2026-25769/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-25769
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- insecure_deserialization
- Status
- unconfirmed
- EPSS
- 42.1%
- Social Posts
- 1
CWE
- CWE-502
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H