Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue.
References
| Link | Resource |
|---|---|
| https://drive.google.com/drive/folders/1WlkKNmHexz8212OVED9O6M_3pI8b6qNI?usp=sharing | Broken Link |
| https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5 | Exploit Vendor Advisory |
| https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5 | Exploit Vendor Advisory |
Configurations
History
19 Mar 2026, 17:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:* | |
| References | () https://drive.google.com/drive/folders/1WlkKNmHexz8212OVED9O6M_3pI8b6qNI?usp=sharing - Broken Link | |
| References | () https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5 - Exploit, Vendor Advisory | |
| First Time |
Wazuh wazuh
Wazuh |
18 Mar 2026, 14:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
17 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5 - |
17 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 18:16
Updated : 2026-03-19 17:18
NVD link : CVE-2026-25769
Mitre link : CVE-2026-25769
CVE.ORG link : CVE-2026-25769
JSON object : View
Products Affected
wazuh
- wazuh
CWE
CWE-502
Deserialization of Untrusted Data
