Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to version 4.13.0, a vulnerability in Wazuh Agent allows authenticated attackers to force NTLM authentication through malicious UNC paths in various agent configuration settings, potentially leading NTLM relay attacks that would result privilege escalation and remote code execution. This issue has been patched in version 4.13.0.
References
| Link | Resource |
|---|---|
| https://github.com/wazuh/wazuh/commit/688972da589e5d40d2a81bcd738240303a3dc45a | Patch |
| https://github.com/wazuh/wazuh/pull/30060 | Issue Tracking |
| https://github.com/wazuh/wazuh/security/advisories/GHSA-x697-jf34-gp5x | Exploit Vendor Advisory |
Configurations
History
02 Dec 2025, 16:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/wazuh/wazuh/commit/688972da589e5d40d2a81bcd738240303a3dc45a - Patch | |
| References | () https://github.com/wazuh/wazuh/pull/30060 - Issue Tracking | |
| References | () https://github.com/wazuh/wazuh/security/advisories/GHSA-x697-jf34-gp5x - Exploit, Vendor Advisory | |
| First Time |
Wazuh wazuh
Wazuh |
|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:* |
21 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-21 19:15
Updated : 2025-12-02 16:45
NVD link : CVE-2025-30201
Mitre link : CVE-2025-30201
CVE.ORG link : CVE-2025-30201
JSON object : View
Products Affected
wazuh
- wazuh
CWE
CWE-73
External Control of File Name or Path
CWE-294Authentication Bypass by Capture-replay
NVD-CWE-noinfo