Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.4.0 to before version 4.14.4, a path traversal vulnerability in Wazuh's cluster synchronization extraction routine allows an authenticated cluster peer to write arbitrary files outside the intended extraction directory on other cluster nodes. This can be escalated to code execution in the Wazuh service context by overwriting Python modules loaded by Wazuh components (proof of concept available as separate attachment). In deployments where the cluster daemon runs with elevated privileges, system-level compromise is possible. This issue has been patched in version 4.14.4.
References
| Link | Resource |
|---|---|
| https://github.com/wazuh/wazuh/releases/tag/v4.14.4 | Release Notes |
| https://github.com/wazuh/wazuh/security/advisories/GHSA-m8rw-v4f6-8787 | Vendor Advisory |
| https://github.com/wazuh/wazuh/security/advisories/GHSA-m8rw-v4f6-8787 | Vendor Advisory |
Configurations
History
30 Apr 2026, 20:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wazuh wazuh
Wazuh |
|
| CPE | cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:* | |
| References | () https://github.com/wazuh/wazuh/releases/tag/v4.14.4 - Release Notes | |
| References | () https://github.com/wazuh/wazuh/security/advisories/GHSA-m8rw-v4f6-8787 - Vendor Advisory |
30 Apr 2026, 15:11
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-29 19:16
Updated : 2026-04-30 20:30
NVD link : CVE-2026-30893
Mitre link : CVE-2026-30893
CVE.ORG link : CVE-2026-30893
JSON object : View
Products Affected
wazuh
- wazuh
