Impact
A flaw in the omd administrative command allows a site user to manipulate files in the site context that are processed when the command runs as root, enabling the user to gain root privileges. The vulnerability is caused by inadequate validation of external input and the use of privileged operations, corresponding to weaknesses CWE‑426 and CWE‑829. The attacker can elevate privileges locally without needing network access, leading to full system compromise if the vulnerability is exploited.
Affected Systems
The affected product is Checkmk from Checkmk GmbH. Versions impacted include Checkmk 2.2.0, all releases of 2.3.0 before patch 2.3.0p46, all releases of 2.4.0 before patch 2.4.0p25, and the beta releases of 2.5.0 before 2.5.0b3. Users of the EOL 2.2.0 or earlier releases are also at risk until they upgrade.
Risk and Exploitability
The CVSS score of 9.3 marks this as a critical vulnerability. Exploitation requires a site user with write access to the site context, which is usually available to authenticated users. The attack does not rely on network reachability, so it is a local privilege escalation scenario. EPSS data is unavailable and the vulnerability is not listed in CISA’s KEV catalog, but the high severity and local nature suggest that organizations should treat it as an imminent risk.
OpenCVE Enrichment