CVE-2024-13986

HIGH

Nagios XI < 2024 - Path Traversal

Title source: rule
STIX 2.1

Description

Nagios XI < 2024R1.3.2 contains a remote code execution vulnerability by chaining two flaws: an arbitrary file upload and a path traversal in the Core Config Snapshots interface. The issue arises from insufficient validation of file paths and extensions during MIB upload and snapshot rename operations. Exploitation results in the placement of attacker-controlled PHP files in a web-accessible directory, executed as the www-data user.

References (5)

Core 5
Core References
Exploit, Third Party Advisory
https://theyhack.me/Nagios-XI-Authenticated-RCE/
Exploit, Third Party Advisory technical-description exploit
https://theyhack.me/Nagios-XI-Authenticated-RCE
Various Sources vendor-advisory patch
https://www.nagios.com/changelog/nagios-xi/
Various Sources vendor-advisory patch
https://www.nagios.com/products/security/#nagios-xi

Scores

CVSS v3 8.8
EPSS 0.0196
EPSS Percentile 83.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-22 CWE-434
Status published
Products (2)
nagios/nagios_xi 2024 r1 (13 CPE variants)
nagios/nagios_xi < 2024
Published Aug 28, 2025
Tracked Since Feb 18, 2026