CVE-2025-24016

CRITICAL KEV NUCLEI

Wazuh server remote code execution caused by an unsafe deserialization vulnerability.

Title source: metasploit

Description

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.

Exploits (10)

nomisec WORKING POC 42 stars
by 0xjessie21 · remote-auth
https://github.com/0xjessie21/CVE-2025-24016
nomisec WORKING POC 7 stars
by guinea-offensive-security · remote
https://github.com/guinea-offensive-security/Wazuh-RCE
nomisec WORKING POC 5 stars
by MuhammadWaseem29 · remote
https://github.com/MuhammadWaseem29/CVE-2025-24016
nomisec SCANNER 4 stars
by huseyinstif · remote
https://github.com/huseyinstif/CVE-2025-24016-Nuclei-Template
nomisec SCANNER 2 stars
by rxerium · poc
https://github.com/rxerium/CVE-2025-24016
nomisec WORKING POC 1 stars
by cybersecplayground · remote
https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
nomisec WORKING POC 1 stars
by GloStarRx1 · poc
https://github.com/GloStarRx1/CVE-2025-24016
nomisec WORKING POC
by celsius026 · remote
https://github.com/celsius026/poc_CVE-2025-24016
metasploit WORKING POC EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/wazuh_auth_rce_cve_2025_24016.rb

Nuclei Templates (1)

Wazuh - Unsafe Deserialization Remote Code Execution
CRITICALby Hüseyin TINTAŞ,ritikchaddha
Shodan: title:"Wazuh"
FOFA: app="Wazuh"

Scores

CVSS v3 9.9
EPSS 0.9351
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H

Details

CISA KEV 2025-06-10
VulnCheck KEV 2025-05-03
ENISA EUVD EUVD-2025-3595
CWE
CWE-502
Status published
Products (2)
wazuh/wazuh 4.4.0 - 4.9.1
wazuh/wazuh 4.4.0 - 4.9.1Go
Published Feb 10, 2025
KEV Added Jun 10, 2025
Tracked Since Feb 18, 2026