Nagios XI versions prior to 2024R2 contain a command injection vulnerability in the WinRM plugin. Insufficient validation of user-supplied parameters allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to modify configuration, exfiltrate data, disrupt monitoring operations, or execute commands on the underlying host operating system.
Advisories

No advisories yet.

Fixes

Solution

Nagios addresses this vulnerability as "Nagios XI was vulnerable to authenticated command injection via the WinRM plugin" and "Fixed security issue in WinRM wizard."


Workaround

No workaround given by the vendor.

History

Thu, 30 Oct 2025 21:45:00 +0000

Type Values Removed Values Added
Description Nagios XI versions prior to 2024R2 contain a command injection vulnerability in the WinRM plugin. Insufficient validation of user-supplied parameters allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to modify configuration, exfiltrate data, disrupt monitoring operations, or execute commands on the underlying host operating system.
Title Nagios XI < 2024R2 Authenticated Command Injection via WinRM Plugin
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-10-30T21:30:19.179Z

Reserved: 2025-04-15T19:15:22.581Z

Link: CVE-2025-34284

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-30T22:15:48.773

Modified: 2025-10-30T22:15:48.773

Link: CVE-2025-34284

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.