openITCOCKPIT is an open source monitoring tool built for different monitoring engines. openITCOCKPIT Community Edition prior to version 5.5.2 contains a command injection vulnerability that allows an authenticated user with permission to add or modify hosts to execute arbitrary OS commands on the monitoring backend. The vulnerability arises because user-controlled host attributes (specifically the host address) are expanded into monitoring command templates without validation, escaping, or quoting. These templates are later executed by the monitoring engine (Nagios/Icinga) via a shell, resulting in remote code execution. Version 5.5.2 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/openITCOCKPIT/openITCOCKPIT/releases/tag/openITCOCKPIT-5.5.2 | Product Release Notes |
| https://github.com/openITCOCKPIT/openITCOCKPIT/security/advisories/GHSA-789q-pw85-j2q2 | Mitigation Vendor Advisory |
| https://openitcockpit.io/blog/posts/2026/2026-04-14-openitcockpit-agent-3.6.0-and-5.5.2 | Press/Media Coverage Release Notes |
Configurations
History
28 Apr 2026, 17:21
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:it-novum:openitcockpit:*:*:*:*:*:*:*:* | |
| First Time |
It-novum openitcockpit
It-novum |
|
| References | () https://github.com/openITCOCKPIT/openITCOCKPIT/releases/tag/openITCOCKPIT-5.5.2 - Product, Release Notes | |
| References | () https://github.com/openITCOCKPIT/openITCOCKPIT/security/advisories/GHSA-789q-pw85-j2q2 - Mitigation, Vendor Advisory | |
| References | () https://openitcockpit.io/blog/posts/2026/2026-04-14-openitcockpit-agent-3.6.0-and-5.5.2 - Press/Media Coverage, Release Notes |
14 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-14 21:16
Updated : 2026-04-28 17:21
NVD link : CVE-2026-24893
Mitre link : CVE-2026-24893
CVE.ORG link : CVE-2026-24893
JSON object : View
Products Affected
it-novum
- openitcockpit
