9.9
CVSSv3

CVE-2025-24016

CVSSv4: NA | CVSSv3: 9.9 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.49431 | KEV: Not Included
Published: 10/02/2025 Updated: 10/02/2025

Vulnerability Summary

Remote Code Execution in Wazuh Servers via Unsafe Deserialization Vulnerability

A remote code execution vulnerability exists in Wazuh, a free and open source threat prevention platform, affecting versions 4.4.0 through 4.9.0. The issue stems from unsafe deserialization in the DistributedAPI parameters, which are serialized as JSON and deserialized using `as_wazuh_object`. An attacker with API access can inject an unsanitized dictionary in a DAPI request/response and forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary Python code. This vulnerability can be triggered by somebody with access to a compromised dashboard, Wazuh server in the cluster, or potentially by a compromised agent depending on specific configurations. Wazuh version 4.9.1 includes a fix for this security issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wazuh wazuh

Github Repositories

CVE-2025-24016

CVE-2025-24016 CVE-2025-24016

Evil-Wazuh-Lab

Evil Wazuh Lab (EWL) EWL is a project that pretends to provide a controlled environment pointing to cyber-training (initially from a "Home Lab and CTF style" perspective, but future work will seek real-world applicability) and it is based on the recently vulnerability discovered on Wazuh, specifically the CVE-2025-24016 EWL is inspired on this highly detailed post,

Evil-Wazuh-Lab

Evil Wazuh Lab (EWL) EWL is a project that pretends to provide a controlled environment pointing to cyber-training (initially from a "Home Lab and CTF style" perspective, but future work will seek real-world applicability) and it is based on the recently vulnerability discovered on Wazuh, specifically the CVE-2025-24016 EWL is inspired on this highly detailed post,

CVE-2025-24016 Wazuh Unsafe Deserialization RCE Detection This repository contains a Nuclei template to detect the unsafe deserialization vulnerability in Wazuh servers, identified as CVE-2025-24016 Template Details id: wazuh-unsafe-deserialization info: name: "Wazuh Unsafe Deserialization RCE Detection" author: "Hüseyin TINTAŞ" severity: critic

A critical RCE vulnerability has been identified in the Wazuh server due to unsafe deserialization in the wazuh-manager package. This bug affects Wazuh versions ≥ 4.4.0 and has been patched in version 4.9.1.

CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE---PoC A critical RCE vulnerability has been identified in the Wazuh server due to unsafe deserialization in the wazuh-manager package This bug affects Wazuh versions ≥ 440 and has been patched in version 491