No analysis available yet.
Vendor Solution
Nagios addresses this vulnerability as "Fixed RCE vulnerability in component download page."
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 05 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios nagios Xi
|
|
| CPEs | cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nagios nagios Xi
|
|
| Metrics |
cvssV3_1
|
Fri, 31 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios xi |
|
| Vendors & Products |
Nagios
Nagios xi |
Thu, 30 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios XI versions prior to 5.4.13 contain a remote code execution vulnerability in the Component Download page. The download/import handler used unsafe command construction with attacker-controlled input and lacked sufficient validation and output encoding, allowing an authenticated user to inject commands or otherwise execute arbitrary code with the privileges of the application service. | |
| Title | Nagios XI < 5.4.13 Component Download Page RCE | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-17T18:21:39.028Z
Reserved: 2025-10-29T20:38:08.409Z
Link: CVE-2018-25122
Updated: 2025-10-31T13:06:06.506Z
Status : Analyzed
Published: 2025-10-30T22:15:37.827
Modified: 2025-11-05T18:26:50.120
Link: CVE-2018-25122
No data.
OpenCVE Enrichment
Updated: 2025-10-31T10:13:14Z