Metrics
Affected Vendors & Products
No advisories yet.
Solution
Nagios addresses this vulnerability as "Authenticated remote execution vulnerability in command_test.php script using the address parameter. User must have access to the CCM to access" and "Fixed postauth RCE issue with CCM test command function in command_test.php."
Workaround
No workaround given by the vendor.
Thu, 30 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Nagios XI versions prior to 5.6.14 contain an authenticated remote command execution vulnerability in the CCM command_test.php script. Insufficient validation of the `address` parameter allows an authenticated user with access to the Core Config Manager to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and may be leveraged to execute commands on the underlying XI host, modify system configuration, or fully compromise the host. | |
| Title | Nagios XI < 5.6.14 Authenticated RCE command_test.php via address | |
| Weaknesses | CWE-78 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-30T21:30:59.762Z
Reserved: 2025-10-20T20:52:37.291Z
Link: CVE-2020-36856
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Received
Published: 2025-10-30T22:15:38.123
Modified: 2025-10-30T22:15:38.123
Link: CVE-2020-36856
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.