Wazuh is a free and open source platform used for threat prevention, detection, and response. In versions starting from 3.8.0 to before 4.11.0, wazuh-analysisd is vulnerable to a heap buffer overflow when parsing XML elements from Windows EventChannel messages. This issue has been patched in version 4.11.0.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/wazuh/wazuh/security/advisories/GHSA-vw3r-mjg3-9hh2 | Exploit Vendor Advisory | 
Configurations
                    History
                    16 Oct 2025, 17:33
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/wazuh/wazuh/security/advisories/GHSA-vw3r-mjg3-9hh2 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:* | |
| First Time | Wazuh wazuh Wazuh | 
27 Sep 2025, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-09-27 01:15
Updated : 2025-10-16 17:33
NVD link : CVE-2025-59938
Mitre link : CVE-2025-59938
CVE.ORG link : CVE-2025-59938
JSON object : View
Products Affected
                wazuh
- wazuh
CWE
                
                    
                        
                        CWE-122
                        
            Heap-based Buffer Overflow
