Description
Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p21, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows users with the "Use WATO" permission to access the "Analyze configuration" page by directly navigating to its URL, bypassing the intended "Access analyze configuration" permission check. If these users also have the "Make changes, perform actions" permission, they can perform unauthorized actions such as disabling checks or acknowledging results.
Published: 2026-02-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Configuration Modification
Action: Patch Immediately
AI Analysis

Impact

Checkmk versions prior to 2.4.0p21, 2.3.0p43, and 2.2.0 (EOL) lack a permission check on the "Analyze configuration" page. Users granted the "Use WATO" permission can access the page simply by navigating to its URL, bypassing the intended "Access analyze configuration" check. If those same users also possess the "Make changes, perform actions" permission, they can carry out unauthorized operations such as disabling checks or acknowledging results, thereby affecting the integrity of monitoring data.

Affected Systems

The vulnerability affects Checkmk (Checkmk GmbH:Checkmk) deployments running 2.4.0 before 2.4.0p21, 2.3.0 before 2.3.0p43, and the end‑of‑life 2.2.0 release. All affected versions allow elevated configuration changes through the Analyze configuration page once the minimal permission set is present.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate impact, and the EPSS score of less than 1% suggests exploitation is unlikely to be frequent in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an attacker to have at least the "Use WATO" permission, which is common for configuration‐management roles, and optionally the "Make changes, perform actions" permission. Attackers who meet these criteria can simply request the page URL from a browser or curl, so the entry point is trivial for authenticated users with those permissions.

Generated by OpenCVE AI on April 18, 2026 at 13:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Checkmk version 2.4.0p21 or newer, 2.3.0p43 or newer, or any release where the permission check on "Analyze configuration" is corrected.
  • Revoke or limit the "Make changes, perform actions" permission for users who only require the "Use WATO" privilege, ensuring that users cannot both access the page and modify configuration settings.
  • Regularly consult Checkmk security advisories and apply updates promptly to mitigate future vulnerabilities.

Generated by OpenCVE AI on April 18, 2026 at 13:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p21, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows users with the "Use WATO" permission to access the "Analyze configuration" page by directly navigating to its URL, bypassing the intended "Access analyze configuration" permission check. If these users also have the "Make changes, perform actions" permission, they can perform unauthorized actions such as disabling checks or acknowledging results.
Title Missing Permission Check on Analyze Configuration Page
First Time appeared Checkmk
Checkmk checkmk
Weaknesses CWE-862
CPEs cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*
Vendors & Products Checkmk
Checkmk checkmk
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Checkmk

Published:

Updated: 2026-02-09T15:54:18.156Z

Reserved: 2026-01-21T14:39:24.127Z

Link: CVE-2026-24095

cve-icon Vulnrichment

Updated: 2026-02-09T15:54:08.329Z

cve-icon NVD

Status : Deferred

Published: 2026-02-09T16:16:00.767

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24095

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses