Miggo Logo

CVE-2025-24016:
Wazuh server vulnerable to remote code execution

9.9

CVSS Score
3.1

Basic Information

EPSS Score
0.99704%
Published
4/22/2025
Updated
4/22/2025
KEV Status
Yes
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/wazuh/wazuhgo>= 4.4.0, < 4.9.14.9.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states that the as_wazuh_object function in framework/wazuh/core/cluster/common.py uses unsafe deserialization. The provided commit 3aadee6d1f3115961036c68b11ca056665e23bc0 directly patches this function by replacing eval() with ast.literal_eval(). The other functions mentioned in the advisory (run_as_login and get_agent_config) are entry points that can lead to the exploitation of the vulnerability in as_wazuh_object, but the core vulnerability lies within as_wazuh_object itself. The changes in test files confirm the vulnerable behavior and its fix.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *n uns*** **s*ri*liz*tion vuln*r**ility *llows *or r*mot* *o** *x**ution on W*zu* s*rv*rs. T** vuln*r**ility **n ** tri***r** *y *ny*o*y wit* *PI ****ss (*ompromis** **s**o*r* or W*zu* s*rv*rs in t** *lust*r) or, in **rt*in *on*i*ur*tio

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s t**t t** `*s_w*zu*_o*j**t` *un*tion in `*r*m*work/w*zu*/*or*/*lust*r/*ommon.py` us*s uns*** **s*ri*liz*tion. T** provi*** *ommit `****************************************` *ir**tly p*t***s t*is *un*tion