← Back to CVEs
CVE-2020-36856
HIGH8.8
Description
Nagios XI versions prior to 5.6.14 contain an authenticated remote command execution vulnerability in the CCM command_test.php script. Insufficient validation of the `address` parameter allows an authenticated user with access to the Core Config Manager to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and may be leveraged to execute commands on the underlying XI host, modify system configuration, or fully compromise the host.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published10/30/2025
Last Modified11/5/2025
Sourcenvd
Honeypot Sightings0
Affected Products
nagios:nagios_xi
Weaknesses (CWE)
CWE-78
References
https://www.nagios.com/changelog/nagios-xi/(disclosure@vulncheck.com)
https://www.nagios.com/products/security/#nagios-xi(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/nagios-xi-authenticated-rce-command-test-php-via-address(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.