Description
The "NagVis" component within Checkmk is vulnerable to remote code execution. An authenticated attacker with administrative level privileges is able to upload a malicious PHP file and modify specific settings to execute the contents of the file as PHP.
References (6)
Core 6
Core References
Mailing List
http://seclists.org/fulldisclosure/2025/Feb/4
Various Sources third-party-advisory
https://korelogic.com/Resources/Advisories/KL-001-2025-002.txt
Various Sources release-notes
https://www.nagvis.org/downloads/changelog/1.9.42
Various Sources release-notes
https://checkmk.com/werks?version=2.3.0p10
Scores
CVSS v3
7.2
EPSS
0.0107
EPSS Percentile
77.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (2)
Checkmk/NagVis
Checkmk 2.3.0p2 - 2.3.0p10
Checkmk/NagVis
NagVis 1.9.40 - 1.9.42
Published
Feb 04, 2025
Tracked Since
Feb 18, 2026