Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue.
References
| Link | Resource |
|---|---|
| https://drive.google.com/drive/folders/1WlkKNmHexz8212OVED9O6M_3pI8b6qNI?usp=sharing | Broken Link |
| https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5 | Exploit Vendor Advisory |
| https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-17 18:16
Updated : 2026-03-19 17:18
NVD link : CVE-2026-25769
Mitre link : CVE-2026-25769
CVE.ORG link : CVE-2026-25769
JSON object : View
Products Affected
wazuh
- wazuh
CWE
CWE-502
Deserialization of Untrusted Data
