CVE-2025-24016
Remote code execution in Wazuh server
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 16, 2025
- Published Date
- February 10, 2025
- Last Updated
- February 12, 2025
- Vendor
- wazuh
- Product
- wazuh
- Description
- Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.
- Tags
- Score
- 76.07% (Percentile: 98.85%) as of 2025-06-03
- Exploitation
- poc
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
EPSS Score
SSVC Information
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-05-06 00:00:00 UTC |
Recent Mentions
CISA Adds Two Known Exploited Vulnerabilities to Catalog
Source: All CISA Advisories • Published: 2025-06-10 12:00:00 UTC
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
Source: TheHackerNews • Published: 2025-06-09 14:46:00 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-24016.yaml | 2025-05-20 05:30:21 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
Type: github • Created: 2025-04-21 19:13:01 UTC • Stars: 0
celsius026/poc_CVE-2025-24016
Type: github • Created: 2025-04-15 14:24:45 UTC • Stars: 0
MuhammadWaseem29/CVE-2025-24016
Type: github • Created: 2025-02-20 23:31:03 UTC • Stars: 32
0xjessie21/CVE-2025-24016
Type: github • Created: 2025-02-16 11:01:12 UTC • Stars: 36
huseyinstif/CVE-2025-24016-Nuclei-Template
Type: github • Created: 2025-02-13 06:38:43 UTC • Stars: 1
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Proof of Concept Exploit Available
-
Added to KEVIntel
-
Detected by Nuclei