Wazuh wazuh-agent and wazuh-manager versions 2.1.0 before 4.8.0 contain multiple shell injection and untrusted search path vulnerabilities that allow attackers to execute arbitrary commands through various components including logcollector configuration, maild SMTP server tags, and Kaspersky AR script parameters. Attackers can exploit these vulnerabilities by injecting malicious commands through configuration files, SMTP server settings, and custom flags to achieve remote code execution on affected systems.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wazuh
Wazuh wazuh-agent Wazuh wazuh-manager |
|
| Vendors & Products |
Wazuh
Wazuh wazuh-agent Wazuh wazuh-manager |
Fri, 27 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Multiple vulnerabilities related to shell injection and path traversal flaws | Wazuh Agent and Manager OS Command Injection and Untrusted Search Path |
Fri, 27 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wazuh wazuh-agent and wazuh-manager versions 2.1.0 before 4.8.0 contain multiple shell injection and untrusted search path vulnerabilities that allow attackers to execute arbitrary commands through various components including logcollector configuration, maild SMTP server tags, and Kaspersky AR script parameters. Attackers can exploit these vulnerabilities by injecting malicious commands through configuration files, SMTP server settings, and custom flags to achieve remote code execution on affected systems. | |
| Title | Multiple vulnerabilities related to shell injection and path traversal flaws | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-27T16:38:20.559Z
Updated: 2026-03-27T19:46:04.116Z
Reserved: 2026-03-27T16:25:45.628Z
Link: CVE-2025-15616
Updated: 2026-03-27T17:28:33.266Z
Status : Received
Published: 2026-03-27T17:16:26.970
Modified: 2026-03-27T17:16:26.970
Link: CVE-2025-15616
No data.