Metrics
Affected Vendors & Products
No advisories yet.
Solution
Nagios addresses this vulnerability as "Fixed security vulernability with audio import directory allowing php files to be uploaded/ran from that directory."
Workaround
No workaround given by the vendor.
Wed, 05 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios nagios Xi
|
|
| CPEs | cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nagios nagios Xi
|
|
| Metrics |
cvssV3_1
|
Fri, 31 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios xi |
|
| Vendors & Products |
Nagios
Nagios xi |
Thu, 30 Oct 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios XI versions prior to 5.7.2 allow PHP files to be uploaded to the Audio Import directory and executed from that location. The upload handler did not properly restrict file types or enforce storage outside of the webroot, and the web server permitted execution within the upload directory. An authenticated attacker with access to the audio import feature could upload a crafted PHP file and then request it to achieve remote code execution with the privileges of the application service. | |
| Title | Nagios XI < 5.7.2 Unrestricted File Upload via Audio Import Directory | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-17T18:21:40.512Z
Reserved: 2025-10-30T14:33:17.562Z
Link: CVE-2020-36863
Updated: 2025-10-31T13:05:34.708Z
Status : Analyzed
Published: 2025-10-30T22:15:39.150
Modified: 2025-11-05T18:24:09.787
Link: CVE-2020-36863
No data.
OpenCVE Enrichment
Updated: 2025-10-31T10:13:16Z