Nagios XI versions prior to 2026R1 contain a remote code execution vulnerability in the Core Config Manager (CCM) Run Check command. Insufficient validation/escaping of parameters used to build backend command lines allows an authenticated administrator to inject shell metacharacters that are executed on the server. Successful exploitation results in arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to gain control of the underlying host operating system.
References
| Link | Resource |
|---|---|
| https://www.nagios.com/changelog/nagios-xi/ | Release Notes |
| https://www.nagios.com/products/security/#nagios-xi | Vendor Advisory |
| https://www.vulncheck.com/advisories/nagios-xi-rce-via-run-check-command-in-ccm | Third Party Advisory |
Configurations
History
06 Nov 2025, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-30 22:15
Updated : 2025-11-06 18:13
NVD link : CVE-2025-34286
Mitre link : CVE-2025-34286
CVE.ORG link : CVE-2025-34286
JSON object : View
Products Affected
nagios
- nagios_xi
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
