Nagios XI versions prior to 5.7.2 allow PHP files to be uploaded to the Audio Import directory and executed from that location. The upload handler did not properly restrict file types or enforce storage outside of the webroot, and the web server permitted execution within the upload directory. An authenticated attacker with access to the audio import feature could upload a crafted PHP file and then request it to achieve remote code execution with the privileges of the application service.
Advisories

No advisories yet.

Fixes

Solution

Nagios addresses this vulnerability as "Fixed security vulernability with audio import directory allowing php files to be uploaded/ran from that directory."


Workaround

No workaround given by the vendor.

History

Thu, 30 Oct 2025 22:00:00 +0000

Type Values Removed Values Added
Description Nagios XI versions prior to 5.7.2 allow PHP files to be uploaded to the Audio Import directory and executed from that location. The upload handler did not properly restrict file types or enforce storage outside of the webroot, and the web server permitted execution within the upload directory. An authenticated attacker with access to the audio import feature could upload a crafted PHP file and then request it to achieve remote code execution with the privileges of the application service.
Title Nagios XI < 5.7.2 Unrestricted File Upload via Audio Import Directory
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-10-30T21:46:58.792Z

Reserved: 2025-10-30T14:33:17.562Z

Link: CVE-2020-36863

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-30T22:15:39.150

Modified: 2025-10-30T22:15:39.150

Link: CVE-2020-36863

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.