CVE-2026-24893

openITCOCKPIT is an open source monitoring tool built for different monitoring engines. openITCOCKPIT Community Edition prior to version 5.5.2 contains a command injection vulnerability that allows an authenticated user with permission to add or modify hosts to execute arbitrary OS commands on the monitoring backend. The vulnerability arises because user-controlled host attributes (specifically the host address) are expanded into monitoring command templates without validation, escaping, or quoting. These templates are later executed by the monitoring engine (Nagios/Icinga) via a shell, resulting in remote code execution. Version 5.5.2 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:it-novum:openitcockpit:*:*:*:*:*:*:*:*

History

28 Apr 2026, 17:21

Type Values Removed Values Added
CPE cpe:2.3:a:it-novum:openitcockpit:*:*:*:*:*:*:*:*
First Time It-novum openitcockpit
It-novum
References () https://github.com/openITCOCKPIT/openITCOCKPIT/releases/tag/openITCOCKPIT-5.5.2 - () https://github.com/openITCOCKPIT/openITCOCKPIT/releases/tag/openITCOCKPIT-5.5.2 - Product, Release Notes
References () https://github.com/openITCOCKPIT/openITCOCKPIT/security/advisories/GHSA-789q-pw85-j2q2 - () https://github.com/openITCOCKPIT/openITCOCKPIT/security/advisories/GHSA-789q-pw85-j2q2 - Mitigation, Vendor Advisory
References () https://openitcockpit.io/blog/posts/2026/2026-04-14-openitcockpit-agent-3.6.0-and-5.5.2 - () https://openitcockpit.io/blog/posts/2026/2026-04-14-openitcockpit-agent-3.6.0-and-5.5.2 - Press/Media Coverage, Release Notes

14 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-14 21:16

Updated : 2026-04-28 17:21


NVD link : CVE-2026-24893

Mitre link : CVE-2026-24893

CVE.ORG link : CVE-2026-24893


JSON object : View

Products Affected

it-novum

  • openitcockpit
CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')