CVE-2025-24016
CVE-2025-24016 CVE-2025-24016
Remote Code Execution in Wazuh Servers via Unsafe Deserialization Vulnerability
A remote code execution vulnerability exists in Wazuh, a free and open source threat prevention platform, affecting versions 4.4.0 through 4.9.0. The issue stems from unsafe deserialization in the DistributedAPI parameters, which are serialized as JSON and deserialized using `as_wazuh_object`. An attacker with API access can inject an unsanitized dictionary in a DAPI request/response and forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary Python code. This vulnerability can be triggered by somebody with access to a compromised dashboard, Wazuh server in the cluster, or potentially by a compromised agent depending on specific configurations. Wazuh version 4.9.1 includes a fix for this security issue.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wazuh wazuh |