Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
History

Tue, 16 Dec 2025 22:30:00 +0000

Type Values Removed Values Added
Description Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Title Nagios XI Privilege Escalation via Writable PHP Include Executed with Sudo
Weaknesses CWE-732
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-16T22:17:02.004Z

Reserved: 2025-04-15T19:15:22.581Z

Link: CVE-2025-34288

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-16T23:15:44.720

Modified: 2025-12-16T23:15:44.720

Link: CVE-2025-34288

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.