Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
References
| Link | Resource |
|---|---|
| https://checkmk.com/werk/18982 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Nov 2025, 13:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://checkmk.com/werk/18982 - Vendor Advisory | |
| First Time |
Checkmk
Checkmk checkmk |
|
| CPE | cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
18 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 16:15
Updated : 2025-11-24 13:58
NVD link : CVE-2025-58122
Mitre link : CVE-2025-58122
CVE.ORG link : CVE-2025-58122
JSON object : View
Products Affected
checkmk
- checkmk
CWE
CWE-280
Improper Handling of Insufficient Permissions or Privileges
