Search criteria
265 vulnerabilities found for checkmk by checkmk
CVE-2025-65000 (GCVE-0-2025-65000)
Vulnerability from nvd – Published: 2025-12-18 14:04 – Updated: 2025-12-18 15:28
VLAI?
Title
Exposure of SSH Private Keys in Remote Alert Handlers (Linux) Rule
Summary
SSH private keys of the "Remote alert handlers (Linux)" rule were exposed in the rule page's HTML source in Checkmk <= 2.4.0p18 and all versions of Checkmk 2.3.0. This potentially allowed unauthorized triggering of predefined alert handlers on hosts where the handler was deployed.
Severity ?
CWE
- CWE-212 - Improper Removal of Sensitive Information Before Storage or Transfer
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p18
(semver)
Affected: 2.3.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-65000",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T15:28:17.768735Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T15:28:51.856Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p18",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p18",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SSH private keys of the \"Remote alert handlers (Linux)\" rule were exposed in the rule page\u0027s HTML source in Checkmk \u003c= 2.4.0p18 and all versions of Checkmk 2.3.0. This potentially allowed unauthorized triggering of predefined alert handlers on hosts where the handler was deployed."
}
],
"impacts": [
{
"capecId": "CAPEC-37",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-37: Retrieve Embedded Sensitive Data"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:L",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-212",
"description": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T14:04:12.809Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/19030"
}
],
"title": "Exposure of SSH Private Keys in Remote Alert Handlers (Linux) Rule",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-65000",
"datePublished": "2025-12-18T14:04:12.809Z",
"dateReserved": "2025-11-12T09:16:24.095Z",
"dateUpdated": "2025-12-18T15:28:51.856Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-64997 (GCVE-0-2025-64997)
Vulnerability from nvd – Published: 2025-12-18 09:11 – Updated: 2025-12-18 14:27
VLAI?
Title
Insufficient permission validation when showing agent information
Summary
Insufficient permission validation in Checkmk versions prior to 2.4.0p17 and 2.3.0p42 allow low-privileged users to view agent information via the REST API, which could lead to information disclosure.
Severity ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p17
(semver)
Affected: 2.3.0 , < 2.3.0p42 (semver) |
Credits
PS Positive Security GmbH
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-64997",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T14:27:39.559764Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T14:27:48.647Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p17",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p42",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p17",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.0p42",
"versionStartIncluding": "2.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "PS Positive Security GmbH"
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient permission validation in Checkmk versions prior to 2.4.0p17 and 2.3.0p42 allow low-privileged users to view agent information via the REST API, which could lead to information disclosure."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-280",
"description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T09:11:17.431Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/18681"
}
],
"title": "Insufficient permission validation when showing agent information"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-64997",
"datePublished": "2025-12-18T09:11:17.431Z",
"dateReserved": "2025-11-12T09:16:24.093Z",
"dateUpdated": "2025-12-18T14:27:48.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-58121 (GCVE-0-2025-58121)
Vulnerability from nvd – Published: 2025-11-18 15:11 – Updated: 2025-11-18 21:34
VLAI?
Title
Insufficient permission validation on multiple REST API endpoints
Summary
Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information
Severity ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p16
(semver)
Affected: 2.3.0 (semver) Affected: 2.2.0 (semver) |
Credits
PS Positive Security GmbH
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-58121",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-18T21:33:57.206220Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T21:34:05.614Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p16",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p16",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "PS Positive Security GmbH"
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information"
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-280",
"description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T15:11:35.167Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/18983"
}
],
"title": "Insufficient permission validation on multiple REST API endpoints",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-58121",
"datePublished": "2025-11-18T15:11:35.167Z",
"dateReserved": "2025-08-25T11:50:49.621Z",
"dateUpdated": "2025-11-18T21:34:05.614Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-58122 (GCVE-0-2025-58122)
Vulnerability from nvd – Published: 2025-11-18 15:11 – Updated: 2025-11-18 21:33
VLAI?
Title
Insufficient permission validation when configuring notification parameters
Summary
Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
Severity ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p16
(semver)
|
Credits
PS Positive Security GmbH
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-58122",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-18T21:33:28.717224Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T21:33:35.695Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p16",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p16",
"versionStartIncluding": "2.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "PS Positive Security GmbH"
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-280",
"description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T15:11:17.244Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/18982"
}
],
"title": "Insufficient permission validation when configuring notification parameters",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-58122",
"datePublished": "2025-11-18T15:11:17.244Z",
"dateReserved": "2025-08-25T11:50:49.622Z",
"dateUpdated": "2025-11-18T21:33:35.695Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-64996 (GCVE-0-2025-64996)
Vulnerability from nvd – Published: 2025-11-18 15:10 – Updated: 2025-11-18 21:23
VLAI?
Title
Overly broad file permissions in the mk_inotify plugin allows reading and manipulating the plugin's output
Summary
In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.
Severity ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p16
(semver)
Affected: 2.3.0 , < 2.3.0p41 (semver) Affected: 2.2.0 (semver) Affected: 2.1.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-64996",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-18T21:22:39.861013Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T21:23:15.114Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p16",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p41",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p16",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.0p41",
"versionStartIncluding": "2.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin\u0027s output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T15:10:53.398Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/18570"
}
],
"title": "Overly broad file permissions in the mk_inotify plugin allows reading and manipulating the plugin\u0027s output",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-64996",
"datePublished": "2025-11-18T15:10:53.398Z",
"dateReserved": "2025-11-12T09:16:24.091Z",
"dateUpdated": "2025-11-18T21:23:15.114Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-39663 (GCVE-0-2025-39663)
Vulnerability from nvd – Published: 2025-10-30 10:43 – Updated: 2025-11-07 16:04
VLAI?
Title
Cross Site Scripting through compromised remote site
Summary
Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).
Severity ?
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p14
(semver)
Affected: 2.3.0 , < 2.3.0p39 (semver) Affected: 2.2.0 (semver) Affected: 2.1.0 (semver) |
Credits
Lisa Gnedt (SBA Research)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-39663",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-30T13:25:54.862081Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T13:25:58.384Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-07T16:04:27.994Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Nov/0"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p14",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p39",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Lisa Gnedt (SBA Research)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in Checkmk\u0027s distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol)."
}
],
"impacts": [
{
"capecId": "CAPEC-592",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-592: Stored XSS"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-80",
"description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T10:44:22.121Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/17998"
},
{
"url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
}
],
"title": "Cross Site Scripting through compromised remote site"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-39663",
"datePublished": "2025-10-30T10:43:08.500Z",
"dateReserved": "2025-04-16T07:07:38.256Z",
"dateUpdated": "2025-11-07T16:04:27.994Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-39664 (GCVE-0-2025-39664)
Vulnerability from nvd – Published: 2025-10-09 15:01 – Updated: 2025-11-03 17:42
VLAI?
Title
Path-Traversal in report scheduler
Summary
Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.
Severity ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p13
(semver)
Affected: 2.3.0 , < 2.3.0p38 (semver) Affected: 2.2.0 , < 2.2.0p46 (semver) Affected: 2.1.0 (semver) |
Credits
Lisa Gnedt (SBA Research)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-39664",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-09T15:11:29.421831Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-14T14:16:32.333Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T17:42:07.064Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Oct/7"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p13",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p38",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p46",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Lisa Gnedt (SBA Research)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient escaping in the report scheduler within Checkmk \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory."
}
],
"impacts": [
{
"capecId": "CAPEC-165",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-165 File Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-13T14:25:22.212Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://checkmk.com/werk/17984"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal"
}
],
"title": "Path-Traversal in report scheduler"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-39664",
"datePublished": "2025-10-09T15:01:55.877Z",
"dateReserved": "2025-04-16T07:07:38.256Z",
"dateUpdated": "2025-11-03T17:42:07.064Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-32919 (GCVE-0-2025-32919)
Vulnerability from nvd – Published: 2025-10-09 15:01 – Updated: 2025-11-03 17:32
VLAI?
Title
Privilege Escalation in Windows License plugin for Checkmk Windows Agent
Summary
Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).
Severity ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p13
(semver)
Affected: 2.3.0 , < 2.3.0p38 (semver) Affected: 2.2.0 , < 2.2.0p46 (semver) Affected: 2.1.0 (semver) |
Credits
Lisa Gnedt (SBA Research)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32919",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-09T15:11:37.536872Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-14T14:16:45.301Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T17:32:30.502Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Oct/6"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p13",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p38",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p46",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Lisa Gnedt (SBA Research)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL)."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233: Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-427",
"description": "CWE-427: Uncontrolled Search Path Element",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-13T14:27:22.386Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://checkmk.com/werk/18207"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250724-01_Checkmk_Agent_Privilege_Escalation_via_Insecure_Temporary_Files"
}
],
"title": "Privilege Escalation in Windows License plugin for Checkmk Windows Agent"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-32919",
"datePublished": "2025-10-09T15:01:42.606Z",
"dateReserved": "2025-04-14T09:52:19.273Z",
"dateUpdated": "2025-11-03T17:32:30.502Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-32916 (GCVE-0-2025-32916)
Vulnerability from nvd – Published: 2025-10-09 15:00 – Updated: 2025-10-14 14:16
VLAI?
Title
Sensitive form data in URL query parameters
Summary
Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs.
Severity ?
CWE
- CWE-598 - Use of GET Request Method With Sensitive Query Strings
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p13
(semver)
Affected: 2.3.0 , < 2.3.0p38 (semver) Affected: 2.2.0 , < 2.2.0p46 (semver) Affected: 2.1.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32916",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-09T15:11:44.557098Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-14T14:16:57.077Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p13",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p38",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p46",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Potential use of sensitive information in GET requests in Checkmk GmbH\u0027s Checkmk versions \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs."
}
],
"impacts": [
{
"capecId": "CAPEC-560",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-560: Use of Known Domain Credentials"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 1,
"baseSeverity": "LOW",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-598",
"description": "CWE-598: Use of GET Request Method With Sensitive Query Strings",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-09T15:00:58.720Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/17105"
}
],
"title": "Sensitive form data in URL query parameters"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-32916",
"datePublished": "2025-10-09T15:00:58.720Z",
"dateReserved": "2025-04-14T09:52:19.273Z",
"dateUpdated": "2025-10-14T14:16:57.077Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32918 (GCVE-0-2025-32918)
Vulnerability from nvd – Published: 2025-07-04 08:12 – Updated: 2025-07-08 14:20
VLAI?
Title
Livestatus injection in autocomplete endpoint
Summary
Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions <2.4.0p6, <2.3.0p35, <2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands.
Severity ?
CWE
- CWE-140 - Improper Neutralization of Delimiters
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p6
(semver)
Affected: 2.3.0 , < 2.3.0p35 (semver) Affected: 2.2.0 , < 2.2.0p44 (semver) Affected: 2.1.0 (semver) |
Credits
PS Positive Security GmbH
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32918",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-08T14:20:18.330549Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-08T14:20:25.426Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p6",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p35",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p44",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "PS Positive Security GmbH"
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions \u003c2.4.0p6, \u003c2.3.0p35, \u003c2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands."
}
],
"impacts": [
{
"capecId": "CAPEC-15",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-15: Command Delimiters"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-140",
"description": "CWE-140: Improper Neutralization of Delimiters",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-04T08:12:21.950Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/17987"
}
],
"title": "Livestatus injection in autocomplete endpoint"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-32918",
"datePublished": "2025-07-04T08:12:21.950Z",
"dateReserved": "2025-04-14T09:52:19.273Z",
"dateUpdated": "2025-07-08T14:20:25.426Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-65000 (GCVE-0-2025-65000)
Vulnerability from cvelistv5 – Published: 2025-12-18 14:04 – Updated: 2025-12-18 15:28
VLAI?
Title
Exposure of SSH Private Keys in Remote Alert Handlers (Linux) Rule
Summary
SSH private keys of the "Remote alert handlers (Linux)" rule were exposed in the rule page's HTML source in Checkmk <= 2.4.0p18 and all versions of Checkmk 2.3.0. This potentially allowed unauthorized triggering of predefined alert handlers on hosts where the handler was deployed.
Severity ?
CWE
- CWE-212 - Improper Removal of Sensitive Information Before Storage or Transfer
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p18
(semver)
Affected: 2.3.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-65000",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T15:28:17.768735Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T15:28:51.856Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p18",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p18",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SSH private keys of the \"Remote alert handlers (Linux)\" rule were exposed in the rule page\u0027s HTML source in Checkmk \u003c= 2.4.0p18 and all versions of Checkmk 2.3.0. This potentially allowed unauthorized triggering of predefined alert handlers on hosts where the handler was deployed."
}
],
"impacts": [
{
"capecId": "CAPEC-37",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-37: Retrieve Embedded Sensitive Data"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:L",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-212",
"description": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T14:04:12.809Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/19030"
}
],
"title": "Exposure of SSH Private Keys in Remote Alert Handlers (Linux) Rule",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-65000",
"datePublished": "2025-12-18T14:04:12.809Z",
"dateReserved": "2025-11-12T09:16:24.095Z",
"dateUpdated": "2025-12-18T15:28:51.856Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-64997 (GCVE-0-2025-64997)
Vulnerability from cvelistv5 – Published: 2025-12-18 09:11 – Updated: 2025-12-18 14:27
VLAI?
Title
Insufficient permission validation when showing agent information
Summary
Insufficient permission validation in Checkmk versions prior to 2.4.0p17 and 2.3.0p42 allow low-privileged users to view agent information via the REST API, which could lead to information disclosure.
Severity ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p17
(semver)
Affected: 2.3.0 , < 2.3.0p42 (semver) |
Credits
PS Positive Security GmbH
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-64997",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-18T14:27:39.559764Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T14:27:48.647Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p17",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p42",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p17",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.0p42",
"versionStartIncluding": "2.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "PS Positive Security GmbH"
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient permission validation in Checkmk versions prior to 2.4.0p17 and 2.3.0p42 allow low-privileged users to view agent information via the REST API, which could lead to information disclosure."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-280",
"description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T09:11:17.431Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/18681"
}
],
"title": "Insufficient permission validation when showing agent information"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-64997",
"datePublished": "2025-12-18T09:11:17.431Z",
"dateReserved": "2025-11-12T09:16:24.093Z",
"dateUpdated": "2025-12-18T14:27:48.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-58121 (GCVE-0-2025-58121)
Vulnerability from cvelistv5 – Published: 2025-11-18 15:11 – Updated: 2025-11-18 21:34
VLAI?
Title
Insufficient permission validation on multiple REST API endpoints
Summary
Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information
Severity ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p16
(semver)
Affected: 2.3.0 (semver) Affected: 2.2.0 (semver) |
Credits
PS Positive Security GmbH
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-58121",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-18T21:33:57.206220Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T21:34:05.614Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p16",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p16",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "PS Positive Security GmbH"
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information"
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-280",
"description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T15:11:35.167Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/18983"
}
],
"title": "Insufficient permission validation on multiple REST API endpoints",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-58121",
"datePublished": "2025-11-18T15:11:35.167Z",
"dateReserved": "2025-08-25T11:50:49.621Z",
"dateUpdated": "2025-11-18T21:34:05.614Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-58122 (GCVE-0-2025-58122)
Vulnerability from cvelistv5 – Published: 2025-11-18 15:11 – Updated: 2025-11-18 21:33
VLAI?
Title
Insufficient permission validation when configuring notification parameters
Summary
Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
Severity ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p16
(semver)
|
Credits
PS Positive Security GmbH
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-58122",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-18T21:33:28.717224Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T21:33:35.695Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p16",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p16",
"versionStartIncluding": "2.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "PS Positive Security GmbH"
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-280",
"description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T15:11:17.244Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/18982"
}
],
"title": "Insufficient permission validation when configuring notification parameters",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-58122",
"datePublished": "2025-11-18T15:11:17.244Z",
"dateReserved": "2025-08-25T11:50:49.622Z",
"dateUpdated": "2025-11-18T21:33:35.695Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-64996 (GCVE-0-2025-64996)
Vulnerability from cvelistv5 – Published: 2025-11-18 15:10 – Updated: 2025-11-18 21:23
VLAI?
Title
Overly broad file permissions in the mk_inotify plugin allows reading and manipulating the plugin's output
Summary
In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.
Severity ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p16
(semver)
Affected: 2.3.0 , < 2.3.0p41 (semver) Affected: 2.2.0 (semver) Affected: 2.1.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-64996",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-18T21:22:39.861013Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T21:23:15.114Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p16",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p41",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0p16",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.0p41",
"versionStartIncluding": "2.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin\u0027s output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-18T15:10:53.398Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/18570"
}
],
"title": "Overly broad file permissions in the mk_inotify plugin allows reading and manipulating the plugin\u0027s output",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-64996",
"datePublished": "2025-11-18T15:10:53.398Z",
"dateReserved": "2025-11-12T09:16:24.091Z",
"dateUpdated": "2025-11-18T21:23:15.114Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-39663 (GCVE-0-2025-39663)
Vulnerability from cvelistv5 – Published: 2025-10-30 10:43 – Updated: 2025-11-07 16:04
VLAI?
Title
Cross Site Scripting through compromised remote site
Summary
Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).
Severity ?
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p14
(semver)
Affected: 2.3.0 , < 2.3.0p39 (semver) Affected: 2.2.0 (semver) Affected: 2.1.0 (semver) |
Credits
Lisa Gnedt (SBA Research)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-39663",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-30T13:25:54.862081Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T13:25:58.384Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-07T16:04:27.994Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Nov/0"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p14",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p39",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Lisa Gnedt (SBA Research)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in Checkmk\u0027s distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol)."
}
],
"impacts": [
{
"capecId": "CAPEC-592",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-592: Stored XSS"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-80",
"description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T10:44:22.121Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/17998"
},
{
"url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
}
],
"title": "Cross Site Scripting through compromised remote site"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-39663",
"datePublished": "2025-10-30T10:43:08.500Z",
"dateReserved": "2025-04-16T07:07:38.256Z",
"dateUpdated": "2025-11-07T16:04:27.994Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-39664 (GCVE-0-2025-39664)
Vulnerability from cvelistv5 – Published: 2025-10-09 15:01 – Updated: 2025-11-03 17:42
VLAI?
Title
Path-Traversal in report scheduler
Summary
Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.
Severity ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p13
(semver)
Affected: 2.3.0 , < 2.3.0p38 (semver) Affected: 2.2.0 , < 2.2.0p46 (semver) Affected: 2.1.0 (semver) |
Credits
Lisa Gnedt (SBA Research)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-39664",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-09T15:11:29.421831Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-14T14:16:32.333Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T17:42:07.064Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Oct/7"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p13",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p38",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p46",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Lisa Gnedt (SBA Research)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient escaping in the report scheduler within Checkmk \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory."
}
],
"impacts": [
{
"capecId": "CAPEC-165",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-165 File Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-13T14:25:22.212Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://checkmk.com/werk/17984"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal"
}
],
"title": "Path-Traversal in report scheduler"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-39664",
"datePublished": "2025-10-09T15:01:55.877Z",
"dateReserved": "2025-04-16T07:07:38.256Z",
"dateUpdated": "2025-11-03T17:42:07.064Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-32919 (GCVE-0-2025-32919)
Vulnerability from cvelistv5 – Published: 2025-10-09 15:01 – Updated: 2025-11-03 17:32
VLAI?
Title
Privilege Escalation in Windows License plugin for Checkmk Windows Agent
Summary
Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).
Severity ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p13
(semver)
Affected: 2.3.0 , < 2.3.0p38 (semver) Affected: 2.2.0 , < 2.2.0p46 (semver) Affected: 2.1.0 (semver) |
Credits
Lisa Gnedt (SBA Research)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32919",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-09T15:11:37.536872Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-14T14:16:45.301Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T17:32:30.502Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Oct/6"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p13",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p38",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p46",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Lisa Gnedt (SBA Research)"
}
],
"descriptions": [
{
"lang": "en",
"value": "Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL)."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233: Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-427",
"description": "CWE-427: Uncontrolled Search Path Element",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-13T14:27:22.386Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://checkmk.com/werk/18207"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250724-01_Checkmk_Agent_Privilege_Escalation_via_Insecure_Temporary_Files"
}
],
"title": "Privilege Escalation in Windows License plugin for Checkmk Windows Agent"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-32919",
"datePublished": "2025-10-09T15:01:42.606Z",
"dateReserved": "2025-04-14T09:52:19.273Z",
"dateUpdated": "2025-11-03T17:32:30.502Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-32916 (GCVE-0-2025-32916)
Vulnerability from cvelistv5 – Published: 2025-10-09 15:00 – Updated: 2025-10-14 14:16
VLAI?
Title
Sensitive form data in URL query parameters
Summary
Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs.
Severity ?
CWE
- CWE-598 - Use of GET Request Method With Sensitive Query Strings
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p13
(semver)
Affected: 2.3.0 , < 2.3.0p38 (semver) Affected: 2.2.0 , < 2.2.0p46 (semver) Affected: 2.1.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32916",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-09T15:11:44.557098Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-14T14:16:57.077Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p13",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p38",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p46",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Potential use of sensitive information in GET requests in Checkmk GmbH\u0027s Checkmk versions \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs."
}
],
"impacts": [
{
"capecId": "CAPEC-560",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-560: Use of Known Domain Credentials"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 1,
"baseSeverity": "LOW",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-598",
"description": "CWE-598: Use of GET Request Method With Sensitive Query Strings",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-09T15:00:58.720Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/17105"
}
],
"title": "Sensitive form data in URL query parameters"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-32916",
"datePublished": "2025-10-09T15:00:58.720Z",
"dateReserved": "2025-04-14T09:52:19.273Z",
"dateUpdated": "2025-10-14T14:16:57.077Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32918 (GCVE-0-2025-32918)
Vulnerability from cvelistv5 – Published: 2025-07-04 08:12 – Updated: 2025-07-08 14:20
VLAI?
Title
Livestatus injection in autocomplete endpoint
Summary
Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions <2.4.0p6, <2.3.0p35, <2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands.
Severity ?
CWE
- CWE-140 - Improper Neutralization of Delimiters
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p6
(semver)
Affected: 2.3.0 , < 2.3.0p35 (semver) Affected: 2.2.0 , < 2.2.0p44 (semver) Affected: 2.1.0 (semver) |
Credits
PS Positive Security GmbH
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32918",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-08T14:20:18.330549Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-08T14:20:25.426Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p6",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p35",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p44",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "PS Positive Security GmbH"
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions \u003c2.4.0p6, \u003c2.3.0p35, \u003c2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands."
}
],
"impacts": [
{
"capecId": "CAPEC-15",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-15: Command Delimiters"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-140",
"description": "CWE-140: Improper Neutralization of Delimiters",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-04T08:12:21.950Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/17987"
}
],
"title": "Livestatus injection in autocomplete endpoint"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-32918",
"datePublished": "2025-07-04T08:12:21.950Z",
"dateReserved": "2025-04-14T09:52:19.273Z",
"dateUpdated": "2025-07-08T14:20:25.426Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32915 (GCVE-0-2025-32915)
Vulnerability from cvelistv5 – Published: 2025-05-22 14:16 – Updated: 2025-05-22 14:48
VLAI?
Title
Sensitive data exposed during automatic agent updates
Summary
Packages downloaded by Checkmk's automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk < 2.4.0p1, < 2.3.0p32, < 2.2.0p42 and <= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data.
Severity ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Checkmk GmbH | Checkmk |
Affected:
2.4.0 , < 2.4.0p1
(semver)
Affected: 2.3.0 , < 2.3.0p32 (semver) Affected: 2.2.0 , < 2.2.0p42 (semver) Affected: 2.1.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32915",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-22T14:48:27.686173Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-22T14:48:38.894Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Checkmk GmbH",
"versions": [
{
"lessThan": "2.4.0p1",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
},
{
"lessThan": "2.3.0p32",
"status": "affected",
"version": "2.3.0",
"versionType": "semver"
},
{
"lessThan": "2.2.0p42",
"status": "affected",
"version": "2.2.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Packages downloaded by Checkmk\u0027s automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk \u003c 2.4.0p1, \u003c 2.3.0p32, \u003c 2.2.0p42 and \u003c= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data."
}
],
"impacts": [
{
"capecId": "CAPEC-560",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-560: Use of Known Domain Credentials"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-22T14:16:01.214Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Checkmk"
},
"references": [
{
"url": "https://checkmk.com/werk/17099"
}
],
"title": "Sensitive data exposed during automatic agent updates"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Checkmk",
"cveId": "CVE-2025-32915",
"datePublished": "2025-05-22T14:16:01.214Z",
"dateReserved": "2025-04-14T09:52:19.272Z",
"dateUpdated": "2025-05-22T14:48:38.894Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2025-64996
Vulnerability from fkie_nvd - Published: 2025-11-18 16:15 - Updated: 2025-11-24 14:13
Severity ?
Summary
In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/18570 | Mitigation, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "784262E3-E643-4564-9FFE-BB8FEDB0A662",
"versionEndExcluding": "2.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "5C43DE3C-0098-4613-B2A4-39607A63CE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "7F5F5665-C2A9-4877-B3F6-59059A1EEFF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "7352D105-D045-427C-BA79-0B16D41139D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "E7963D66-A89A-4167-A2BA-DFF89B439EAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "42099281-2026-4507-A20B-C669C206ADB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "29A44B1E-83CD-4A3D-AFFD-82AAC7760293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin\u0027s output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data."
}
],
"id": "CVE-2025-64996",
"lastModified": "2025-11-24T14:13:26.960",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-11-18T16:15:46.563",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/18570"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-58122
Vulnerability from fkie_nvd - Published: 2025-11-18 16:15 - Updated: 2025-11-24 13:58
Severity ?
Summary
Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/18982 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "E7963D66-A89A-4167-A2BA-DFF89B439EAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "42099281-2026-4507-A20B-C669C206ADB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "29A44B1E-83CD-4A3D-AFFD-82AAC7760293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure."
}
],
"id": "CVE-2025-58122",
"lastModified": "2025-11-24T13:58:28.350",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-11-18T16:15:44.930",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/18982"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-280"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-58121
Vulnerability from fkie_nvd - Published: 2025-11-18 16:15 - Updated: 2025-11-24 14:27
Severity ?
Summary
Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/18983 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| checkmk | checkmk | * | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 | |
| checkmk | checkmk | 2.4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2AD7DF0-B425-4248-84DB-E7BE57629452",
"versionEndExcluding": "2.4.0",
"versionStartIncluding": "2.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "E7963D66-A89A-4167-A2BA-DFF89B439EAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "42099281-2026-4507-A20B-C669C206ADB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "29A44B1E-83CD-4A3D-AFFD-82AAC7760293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information"
}
],
"id": "CVE-2025-58121",
"lastModified": "2025-11-24T14:27:29.577",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-11-18T16:15:44.700",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/18983"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-280"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-39663
Vulnerability from fkie_nvd - Published: 2025-10-30 11:15 - Updated: 2025-12-03 20:06
Severity ?
Summary
Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/17998 | Vendor Advisory | |
| security@checkmk.com | https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Nov/0 | Exploit, Mailing List, Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D767AB0-24B0-4BDE-8B7F-90BD7A40E496",
"versionEndExcluding": "2.3.0",
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "5C43DE3C-0098-4613-B2A4-39607A63CE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "E7963D66-A89A-4167-A2BA-DFF89B439EAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in Checkmk\u0027s distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol)."
}
],
"id": "CVE-2025-39663",
"lastModified": "2025-12-03T20:06:16.960",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-10-30T11:15:32.400",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/17998"
},
{
"source": "security@checkmk.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2025/Nov/0"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-80"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-32919
Vulnerability from fkie_nvd - Published: 2025-10-09 15:16 - Updated: 2025-12-04 20:39
Severity ?
Summary
Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/18207 | Vendor Advisory | |
| security@checkmk.com | https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250724-01_Checkmk_Agent_Privilege_Escalation_via_Insecure_Temporary_Files | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Oct/6 | Exploit, Mailing List, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4491352C-E13B-45DF-AC48-50B27AE037BD",
"versionEndExcluding": "2.2.0",
"versionStartIncluding": "2.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
"matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*",
"matchCriteriaId": "C03BBDDF-F96F-4A36-A7F5-7102A31EC606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*",
"matchCriteriaId": "92088ED6-F6A8-400A-B015-4F4E02D55ABC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*",
"matchCriteriaId": "AE5F4DD6-9473-4581-BD0E-1D916A7FEF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*",
"matchCriteriaId": "6541E323-356B-4B9F-B646-950400122EB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL)."
}
],
"id": "CVE-2025-32919",
"lastModified": "2025-12-04T20:39:36.420",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-10-09T15:16:06.057",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/18207"
},
{
"source": "security@checkmk.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250724-01_Checkmk_Agent_Privilege_Escalation_via_Insecure_Temporary_Files"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2025/Oct/6"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-39664
Vulnerability from fkie_nvd - Published: 2025-10-09 15:16 - Updated: 2025-12-04 20:37
Severity ?
Summary
Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/17984 | Vendor Advisory | |
| security@checkmk.com | https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Oct/7 | Exploit, Mailing List, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4491352C-E13B-45DF-AC48-50B27AE037BD",
"versionEndExcluding": "2.2.0",
"versionStartIncluding": "2.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
"matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*",
"matchCriteriaId": "C03BBDDF-F96F-4A36-A7F5-7102A31EC606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*",
"matchCriteriaId": "92088ED6-F6A8-400A-B015-4F4E02D55ABC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*",
"matchCriteriaId": "AE5F4DD6-9473-4581-BD0E-1D916A7FEF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*",
"matchCriteriaId": "6541E323-356B-4B9F-B646-950400122EB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient escaping in the report scheduler within Checkmk \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory."
}
],
"id": "CVE-2025-39664",
"lastModified": "2025-12-04T20:37:25.413",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-10-09T15:16:06.363",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/17984"
},
{
"source": "security@checkmk.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2025/Oct/7"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-32916
Vulnerability from fkie_nvd - Published: 2025-10-09 15:16 - Updated: 2025-12-04 20:44
Severity ?
Summary
Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs.
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/17105 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4491352C-E13B-45DF-AC48-50B27AE037BD",
"versionEndExcluding": "2.2.0",
"versionStartIncluding": "2.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
"matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*",
"matchCriteriaId": "C03BBDDF-F96F-4A36-A7F5-7102A31EC606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*",
"matchCriteriaId": "92088ED6-F6A8-400A-B015-4F4E02D55ABC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*",
"matchCriteriaId": "AE5F4DD6-9473-4581-BD0E-1D916A7FEF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*",
"matchCriteriaId": "6541E323-356B-4B9F-B646-950400122EB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Potential use of sensitive information in GET requests in Checkmk GmbH\u0027s Checkmk versions \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs."
}
],
"id": "CVE-2025-32916",
"lastModified": "2025-12-04T20:44:21.820",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 1.0,
"baseSeverity": "LOW",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-10-09T15:16:05.503",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/17105"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-598"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-32918
Vulnerability from fkie_nvd - Published: 2025-07-04 08:15 - Updated: 2025-08-22 13:29
Severity ?
Summary
Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions <2.4.0p6, <2.3.0p35, <2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands.
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/17987 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AED3C-E447-429C-A028-B100CD51AB7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
"matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
"matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*",
"matchCriteriaId": "C03BBDDF-F96F-4A36-A7F5-7102A31EC606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*",
"matchCriteriaId": "92088ED6-F6A8-400A-B015-4F4E02D55ABC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions \u003c2.4.0p6, \u003c2.3.0p35, \u003c2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands."
},
{
"lang": "es",
"value": "La neutralizaci\u00f3n incorrecta de los delimitadores del comando Livestatus en el endpoint de autocompletar dentro de RestAPI de las versiones de Checkmk \u0026lt;2.4.0p6, \u0026lt;2.3.0p35, \u0026lt;2.2.0p44 y 2.1.0 (EOL) permite que un usuario autenticado inyecte comandos Livestatus arbitrarios."
}
],
"id": "CVE-2025-32918",
"lastModified": "2025-08-22T13:29:48.400",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-07-04T08:15:25.520",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/17987"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-140"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-32915
Vulnerability from fkie_nvd - Published: 2025-05-22 15:16 - Updated: 2025-08-26 15:36
Severity ?
Summary
Packages downloaded by Checkmk's automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk < 2.4.0p1, < 2.3.0p32, < 2.2.0p42 and <= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data.
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/17099 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "8A34B28B-2BD9-4F28-9428-8CF7FCEAD7C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "D3FC491E-DE27-4C8F-B699-DB5260935D51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "0BE2C8FE-20CC-4B7E-B27B-54C873DC7530",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*",
"matchCriteriaId": "5C3C3714-C696-4456-88AA-B6E4EFC73C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*",
"matchCriteriaId": "BFF9D1C9-C340-4C31-A3EA-74EF85C6F34D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*",
"matchCriteriaId": "A70FBA9D-F7DF-4961-9518-F7AE14FE174D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*",
"matchCriteriaId": "FB38424F-0955-4FE3-9C1D-69D21A08AA8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*",
"matchCriteriaId": "4EE19624-17FB-45DD-926D-1A745FF02CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p46:*:*:*:*:*:*",
"matchCriteriaId": "C7E289B5-B6C6-4514-9CA1-5EBE155ECFE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p47:*:*:*:*:*:*",
"matchCriteriaId": "ECBDBA95-0CAA-42A2-A3B1-B4D0DF1F7523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p48:*:*:*:*:*:*",
"matchCriteriaId": "B0819489-976E-4C46-9D76-0338F40C2A64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p49:*:*:*:*:*:*",
"matchCriteriaId": "9B370CA8-15E9-4850-85C6-93C9B39AC068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
"matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
"matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Packages downloaded by Checkmk\u0027s automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk \u003c 2.4.0p1, \u003c 2.3.0p32, \u003c 2.2.0p42 and \u003c= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data."
},
{
"lang": "es",
"value": "Los paquetes descargados por las actualizaciones autom\u00e1ticas del agente de Checkmk en Linux y Solaris tienen permisos incorrectos en Checkmk \u0026lt; 2.4.0p1, \u0026lt; 2.3.0p32, \u0026lt; 2.2.0p42 y \u0026lt;= 2.1.0p49 (EOL). Esto permite que un atacante local acceda a datos confidenciales."
}
],
"id": "CVE-2025-32915",
"lastModified": "2025-08-26T15:36:59.907",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@checkmk.com",
"type": "Secondary"
}
]
},
"published": "2025-05-22T15:16:04.870",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/17099"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
}
]
}