Description
Local privilege escalation in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows a site user to escalate their privileges to root, by manipulating files in the site context that are processed when the `omd` administrative command is run by root.
Published: 2026-04-07
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Root Privilege Escalation
Action: Patch Now
AI Analysis

Impact

This vulnerability permits a site user in Checkmk to elevate privileges to root by manipulating files in the site context that are processed during an omd command run by root. The flaw arises from insufficient validation of files handled by root‑executed administrative commands, allowing destructive modification. An attacker who can write into the site context can thereby gain full system control.

Affected Systems

Affects Checkmk 2.2.0 (end of life), all 2.3.0 releases prior to patch 2.3.0p46, all 2.4.0 releases prior to patch 2.4.0p25, and the beta 2.5.0 releases prior to update 2.5.0b3. Any installation of these versions that has the omd service running as root is vulnerable.

Risk and Exploitability

With a CVSS score of 9.3 the issue is considered critical. EPSS indicates a very low probability of exploitation, less than 1 percent, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is local, requiring the attacker to be a legitimate site user with write access to the site context. If achieved, the attacker can become root and compromise the entire host. Administrators should treat this as a high‑risk vulnerability that warrants immediate patching.

Generated by OpenCVE AI on April 14, 2026 at 16:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch for your Checkmk version: upgrade to 2.3.0p46 or newer, 2.4.0p25 or newer, or 2.5.0b3 or newer, or transition to the latest stable release.
  • If an update cannot be applied immediately, reduce the write permissions of site users for files that are processed by omd, effectively preventing the manipulation that triggers the elevation.
  • Enable and review audit logs for file modifications in the site context to detect potential abuse, and monitor for unexpected ownership changes.
  • Verify the integrity of the Checkmk installation after any updates and confirm that the omd command runs without unintended privilege escalation.

Generated by OpenCVE AI on April 14, 2026 at 16:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Tue, 14 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p46:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p47:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p38:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p39:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p40:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p41:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p42:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p43:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p44:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p45:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.5.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.5.0:b2:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Local privilege escalation in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows a site user to escalate their privileges to root, by manipulating files in the site context that are processed when the `omd` administrative command is run by root.
Title omd: Local privilege escalation when executing omd commands as root
First Time appeared Checkmk
Checkmk checkmk
Weaknesses CWE-426
CWE-829
CPEs cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*
Vendors & Products Checkmk
Checkmk checkmk
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Checkmk

Published:

Updated: 2026-04-07T13:18:19.609Z

Reserved: 2025-04-16T07:07:38.257Z

Link: CVE-2025-39666

cve-icon Vulnrichment

Updated: 2026-04-07T13:18:16.178Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T13:16:44.847

Modified: 2026-04-14T15:39:05.660

Link: CVE-2025-39666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:41:05Z

Weaknesses