Wazuh Cluster vulnerable to Remote Code Execution via Insecure Deserialization
Title source: cnaDescription
Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue.
Exploits (4)
Scores
CVSS v3
9.1
EPSS
0.0032
EPSS Percentile
55.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+1 more repos
Details
CWE
CWE-502
Status
published
Products (2)
wazuh/wazuh
4.0.0 - 4.14.3
wazuh/wazuh
>= 4.0.0, < 4.14.3
Published
Mar 17, 2026
Tracked Since
Mar 18, 2026