TROYANOSYVIRUS
Back to CVEs

CVE-2025-24016

CRITICALCISA KEV
9.9

Description

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.

CVE Details

CVSS v3.1 Score9.9
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/10/2025
Last Modified10/24/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorWazuh
ProductWazuh Server
Vulnerability NameWazuh Server Deserialization of Untrusted Data Vulnerability
KEV Date Added2025-06-10
Remediation Due Date2025-07-01
Ransomware UseUnknown

Affected Products

wazuh:wazuh

Weaknesses (CWE)

CWE-502

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.