Metrics
Affected Vendors & Products
No advisories yet.
Solution
According to the vendor changelog, this issue was addressed by changing the ownership of constants.inc.php.
Workaround
No workaround given by the vendor.
Wed, 24 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2026:r1.0.1:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2026:r1:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Wed, 17 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios nagios Xi Nagios xi |
|
| Vendors & Products |
Nagios
Nagios nagios Xi Nagios xi |
Tue, 16 Dec 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user. | |
| Title | Nagios XI Privilege Escalation via Writable PHP Include Executed with Sudo | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-18T04:55:16.774Z
Reserved: 2025-04-15T19:15:22.581Z
Link: CVE-2025-34288
Updated: 2025-12-17T21:16:25.449Z
Status : Analyzed
Published: 2025-12-16T23:15:44.720
Modified: 2025-12-24T17:57:41.600
Link: CVE-2025-34288
No data.
OpenCVE Enrichment
Updated: 2025-12-17T14:28:52Z