PT-2026-25922 · Wazuh · Wazuh
Skraft9
+1
·
Published
2026-03-17
·
Updated
2026-03-17
·
CVE-2026-25769
CVSS v3.1
9.1
| Vector | AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue.
Exploit
Fix
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Wazuh