Impact
This vulnerability permits a site user in Checkmk to elevate privileges to root by manipulating files in the site context that are processed during an omd command run by root. The flaw arises from insufficient validation of files handled by root‑executed administrative commands, allowing destructive modification. An attacker who can write into the site context can thereby gain full system control.
Affected Systems
Affects Checkmk 2.2.0 (end of life), all 2.3.0 releases prior to patch 2.3.0p46, all 2.4.0 releases prior to patch 2.4.0p25, and the beta 2.5.0 releases prior to update 2.5.0b3. Any installation of these versions that has the omd service running as root is vulnerable.
Risk and Exploitability
With a CVSS score of 9.3 the issue is considered critical. EPSS indicates a very low probability of exploitation, less than 1 percent, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is local, requiring the attacker to be a legitimate site user with write access to the site context. If achieved, the attacker can become root and compromise the entire host. Administrators should treat this as a high‑risk vulnerability that warrants immediate patching.
OpenCVE Enrichment