Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
738 articles · 106207 vulns · 36/50 feeds (7d)
← Back to list
9.1
CVE-2026-25769

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of U

Description

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue.

Affected Products

VendorProductVersions
wazuhwazuh< 4.14.3

References

  • https://drive.google.com/drive/folders/1WlkKNmHexz8212OVED9O6M_3pI8b6qNI?usp=sharing(Broken Link)
  • https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5(Exploit, Vendor Advisory)
  • https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5(Exploit, Vendor Advisory)

Related News (1 articles)

Tier B
CERT-FR2d ago
Bulletin d'actualité CERTFR-2026-ACT-012 (23 mars 2026)
→ No new info (linked only)
CVSS 3.19.1 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited❌ No
CWECWE-502
Published3/17/2026
Last enriched4h ago
Trending Score16
Source articles1
Independent1
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%