Search criteria

261 vulnerabilities found for checkmk by checkmk

FKIE_CVE-2025-64996

Vulnerability from fkie_nvd - Published: 2025-11-18 16:15 - Updated: 2025-11-24 14:13
Summary
In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.
References
security@checkmk.comhttps://checkmk.com/werk/18570Mitigation, Vendor Advisory
Impacted products
Vendor Product Version
checkmk checkmk *
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "784262E3-E643-4564-9FFE-BB8FEDB0A662",
              "versionEndExcluding": "2.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "5C43DE3C-0098-4613-B2A4-39607A63CE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p39:*:*:*:*:*:*",
              "matchCriteriaId": "7F5F5665-C2A9-4877-B3F6-59059A1EEFF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p40:*:*:*:*:*:*",
              "matchCriteriaId": "7352D105-D045-427C-BA79-0B16D41139D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "E7963D66-A89A-4167-A2BA-DFF89B439EAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "42099281-2026-4507-A20B-C669C206ADB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "29A44B1E-83CD-4A3D-AFFD-82AAC7760293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin\u0027s output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data."
    }
  ],
  "id": "CVE-2025-64996",
  "lastModified": "2025-11-24T14:13:26.960",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "LOW",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "NONE",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "LOW",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-11-18T16:15:46.563",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/18570"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-58121

Vulnerability from fkie_nvd - Published: 2025-11-18 16:15 - Updated: 2025-11-24 14:27
Summary
Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information
References
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AD7DF0-B425-4248-84DB-E7BE57629452",
              "versionEndExcluding": "2.4.0",
              "versionStartIncluding": "2.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "E7963D66-A89A-4167-A2BA-DFF89B439EAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "42099281-2026-4507-A20B-C669C206ADB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "29A44B1E-83CD-4A3D-AFFD-82AAC7760293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information"
    }
  ],
  "id": "CVE-2025-58121",
  "lastModified": "2025-11-24T14:27:29.577",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "LOW",
          "vulnIntegrityImpact": "LOW",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-11-18T16:15:44.700",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/18983"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-280"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-58122

Vulnerability from fkie_nvd - Published: 2025-11-18 16:15 - Updated: 2025-11-24 13:58
Summary
Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
References
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "E7963D66-A89A-4167-A2BA-DFF89B439EAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "42099281-2026-4507-A20B-C669C206ADB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "29A44B1E-83CD-4A3D-AFFD-82AAC7760293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure."
    }
  ],
  "id": "CVE-2025-58122",
  "lastModified": "2025-11-24T13:58:28.350",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "LOW",
          "vulnIntegrityImpact": "LOW",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-11-18T16:15:44.930",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/18982"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-280"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-39663

Vulnerability from fkie_nvd - Published: 2025-10-30 11:15 - Updated: 2025-12-03 20:06
Summary
Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D767AB0-24B0-4BDE-8B7F-90BD7A40E496",
              "versionEndExcluding": "2.3.0",
              "versionStartIncluding": "2.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "5C43DE3C-0098-4613-B2A4-39607A63CE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "E7963D66-A89A-4167-A2BA-DFF89B439EAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-Site Scripting (XSS) vulnerability in Checkmk\u0027s distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol)."
    }
  ],
  "id": "CVE-2025-39663",
  "lastModified": "2025-12-03T20:06:16.960",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-30T11:15:32.400",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/17998"
    },
    {
      "source": "security@checkmk.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2025/Nov/0"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-80"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2025-32919

Vulnerability from fkie_nvd - Published: 2025-10-09 15:16 - Updated: 2025-12-04 20:39
Summary
Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).
Impacted products
Vendor Product Version
checkmk checkmk *
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4491352C-E13B-45DF-AC48-50B27AE037BD",
              "versionEndExcluding": "2.2.0",
              "versionStartIncluding": "2.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
              "matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
              "matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
              "matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*",
              "matchCriteriaId": "C03BBDDF-F96F-4A36-A7F5-7102A31EC606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*",
              "matchCriteriaId": "92088ED6-F6A8-400A-B015-4F4E02D55ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*",
              "matchCriteriaId": "AE5F4DD6-9473-4581-BD0E-1D916A7FEF85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*",
              "matchCriteriaId": "6541E323-356B-4B9F-B646-950400122EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL)."
    }
  ],
  "id": "CVE-2025-32919",
  "lastModified": "2025-12-04T20:39:36.420",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "PRESENT",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "HIGH",
          "subConfidentialityImpact": "HIGH",
          "subIntegrityImpact": "HIGH",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-09T15:16:06.057",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/18207"
    },
    {
      "source": "security@checkmk.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250724-01_Checkmk_Agent_Privilege_Escalation_via_Insecure_Temporary_Files"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2025/Oct/6"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-39664

Vulnerability from fkie_nvd - Published: 2025-10-09 15:16 - Updated: 2025-12-04 20:37
Summary
Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.
Impacted products
Vendor Product Version
checkmk checkmk *
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4491352C-E13B-45DF-AC48-50B27AE037BD",
              "versionEndExcluding": "2.2.0",
              "versionStartIncluding": "2.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
              "matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
              "matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
              "matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*",
              "matchCriteriaId": "C03BBDDF-F96F-4A36-A7F5-7102A31EC606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*",
              "matchCriteriaId": "92088ED6-F6A8-400A-B015-4F4E02D55ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*",
              "matchCriteriaId": "AE5F4DD6-9473-4581-BD0E-1D916A7FEF85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*",
              "matchCriteriaId": "6541E323-356B-4B9F-B646-950400122EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient escaping in the report scheduler within Checkmk \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory."
    }
  ],
  "id": "CVE-2025-39664",
  "lastModified": "2025-12-04T20:37:25.413",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "LOW",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-09T15:16:06.363",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/17984"
    },
    {
      "source": "security@checkmk.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2025/Oct/7"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-32916

Vulnerability from fkie_nvd - Published: 2025-10-09 15:16 - Updated: 2025-12-04 20:44
Summary
Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs.
References
Impacted products
Vendor Product Version
checkmk checkmk *
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4491352C-E13B-45DF-AC48-50B27AE037BD",
              "versionEndExcluding": "2.2.0",
              "versionStartIncluding": "2.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
              "matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
              "matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
              "matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*",
              "matchCriteriaId": "C03BBDDF-F96F-4A36-A7F5-7102A31EC606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*",
              "matchCriteriaId": "92088ED6-F6A8-400A-B015-4F4E02D55ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*",
              "matchCriteriaId": "AE5F4DD6-9473-4581-BD0E-1D916A7FEF85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*",
              "matchCriteriaId": "6541E323-356B-4B9F-B646-950400122EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "FCCE61D4-00B1-4D83-8FAE-8F2FA8F48E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "FDB9628A-5A72-4DD5-9D4A-CBE13B0CFDF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "E34FEBB1-0935-4363-B4FE-45901BFC9A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "577F9F72-2FDA-4F87-A840-05158F2368B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "6F3AD894-660B-41FC-B910-899A764A00B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "21853BB4-1BB5-40E3-82E2-253899D898ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "0E2D2F49-32B2-42AA-B99E-7C39403CF104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "ACE440F8-EBF5-4DBB-A215-57D770C66219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "1A94395D-DDCE-4977-89CA-46F71C3CA2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9513876C-8DF0-4A59-864F-8401BAA43376",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Potential use of sensitive information in GET requests in Checkmk GmbH\u0027s Checkmk versions \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs."
    }
  ],
  "id": "CVE-2025-32916",
  "lastModified": "2025-12-04T20:44:21.820",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "PRESENT",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 1.0,
          "baseSeverity": "LOW",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "LOW",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "NONE",
          "vulnConfidentialityImpact": "LOW",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-10-09T15:16:05.503",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/17105"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-598"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-32918

Vulnerability from fkie_nvd - Published: 2025-07-04 08:15 - Updated: 2025-08-22 13:29
Summary
Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions <2.4.0p6, <2.3.0p35, <2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands.
References
Impacted products
Vendor Product Version
checkmk checkmk 2.1.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A6AED3C-E447-429C-A028-B100CD51AB7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
              "matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
              "matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
              "matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*",
              "matchCriteriaId": "C03BBDDF-F96F-4A36-A7F5-7102A31EC606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*",
              "matchCriteriaId": "92088ED6-F6A8-400A-B015-4F4E02D55ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "28568D2A-CA5B-42C2-8A32-FF783CB7A06F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "F82F8827-B7B2-4C10-A42A-77781BC7B24B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "F641BB83-8A0D-42D0-AB3E-7314918FDC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "1CFE68AB-1F57-497C-9229-29ED3A73D87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B11306B4-1092-470C-BA87-DBD02A18A74B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "74F78C48-030A-48A1-B69E-04C4EA5CCC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8701A914-774B-4E3B-A651-4A9FD19A187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "19E40054-C44D-4C4C-B077-0333D8201E5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions \u003c2.4.0p6, \u003c2.3.0p35, \u003c2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands."
    },
    {
      "lang": "es",
      "value": "La neutralizaci\u00f3n incorrecta de los delimitadores del comando Livestatus en el endpoint de autocompletar dentro de RestAPI de las versiones de Checkmk \u0026lt;2.4.0p6, \u0026lt;2.3.0p35, \u0026lt;2.2.0p44 y 2.1.0 (EOL) permite que un usuario autenticado inyecte comandos Livestatus arbitrarios."
    }
  ],
  "id": "CVE-2025-32918",
  "lastModified": "2025-08-22T13:29:48.400",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "LOW",
          "vulnConfidentialityImpact": "LOW",
          "vulnIntegrityImpact": "LOW",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-04T08:15:25.520",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/17987"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-140"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-32915

Vulnerability from fkie_nvd - Published: 2025-05-22 15:16 - Updated: 2025-08-26 15:36
Summary
Packages downloaded by Checkmk's automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk < 2.4.0p1, < 2.3.0p32, < 2.2.0p42 and <= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data.
References
Impacted products
Vendor Product Version
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
linux linux_kernel -
oracle solaris -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
              "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "8A34B28B-2BD9-4F28-9428-8CF7FCEAD7C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*",
              "matchCriteriaId": "D3FC491E-DE27-4C8F-B699-DB5260935D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*",
              "matchCriteriaId": "0BE2C8FE-20CC-4B7E-B27B-54C873DC7530",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*",
              "matchCriteriaId": "5C3C3714-C696-4456-88AA-B6E4EFC73C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*",
              "matchCriteriaId": "BFF9D1C9-C340-4C31-A3EA-74EF85C6F34D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*",
              "matchCriteriaId": "A70FBA9D-F7DF-4961-9518-F7AE14FE174D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*",
              "matchCriteriaId": "FB38424F-0955-4FE3-9C1D-69D21A08AA8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*",
              "matchCriteriaId": "4EE19624-17FB-45DD-926D-1A745FF02CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p46:*:*:*:*:*:*",
              "matchCriteriaId": "C7E289B5-B6C6-4514-9CA1-5EBE155ECFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p47:*:*:*:*:*:*",
              "matchCriteriaId": "ECBDBA95-0CAA-42A2-A3B1-B4D0DF1F7523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p48:*:*:*:*:*:*",
              "matchCriteriaId": "B0819489-976E-4C46-9D76-0338F40C2A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p49:*:*:*:*:*:*",
              "matchCriteriaId": "9B370CA8-15E9-4850-85C6-93C9B39AC068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
              "matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
              "matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
              "matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Packages downloaded by Checkmk\u0027s automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk \u003c 2.4.0p1, \u003c 2.3.0p32, \u003c 2.2.0p42 and \u003c= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data."
    },
    {
      "lang": "es",
      "value": "Los paquetes descargados por las actualizaciones autom\u00e1ticas del agente de Checkmk en Linux y Solaris tienen permisos incorrectos en Checkmk \u0026lt; 2.4.0p1, \u0026lt; 2.3.0p32, \u0026lt; 2.2.0p42 y \u0026lt;= 2.1.0p49 (EOL). Esto permite que un atacante local acceda a datos confidenciales."
    }
  ],
  "id": "CVE-2025-32915",
  "lastModified": "2025-08-26T15:36:59.907",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "PRESENT",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "HIGH",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "NONE",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-22T15:16:04.870",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/17099"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-1712

Vulnerability from fkie_nvd - Published: 2025-05-21 09:15 - Updated: 2025-08-22 19:44
Summary
Argument injection in special agent configuration in Checkmk <2.4.0p1, <2.3.0p32, <2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files
References
Impacted products
Vendor Product Version
checkmk checkmk *
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA5D101-C0EC-4F35-9002-739D12D89233",
              "versionEndExcluding": "2.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "C1294EAE-5CB5-422F-B4C6-3A81B06DE49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "2A347A18-7C59-40F5-8CBA-9F9A18B1E105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*",
              "matchCriteriaId": "442780BC-F984-47A3-9F5F-9A5049531C34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*",
              "matchCriteriaId": "768541E6-C94D-4B32-9144-18D81A1AE047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*",
              "matchCriteriaId": "00793C7E-5C20-4696-B829-804CFA8690B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDAAE70A-6E7D-461D-8260-89D871CB10ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "86ED47B6-58FB-4BAC-9C87-F7BC08AB3870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "2CFF173A-373B-4948-BD22-86C031B58E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "90648825-55F7-472A-944E-7E5C787FAFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "6EE2BA6D-737A-4EEB-B8A2-91E9C61B70C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "94FA8F05-267D-4B24-9AA3-A77FAD259310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "085B463B-633A-447A-B61C-99DD78B49A00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "F5DB112B-EE65-4BAB-AED8-716E618FD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EDBC8-A6A7-4348-8446-1D1DDDACDC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "CB0E10D1-2497-4CAE-ABA5-9F861C6A65DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "9E64A46A-A1E2-4272-A7B8-36140AF2B889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "022C075A-4B04-4141-A7D7-F93C9A7CE0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "60C00469-0CD1-4E9C-8370-CE113842056C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "179905FC-821F-4214-A872-E4E3702419D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "04956994-D5A8-45EE-9DC2-8A1D3058CE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "8868449B-7259-4C3B-8344-0EFE0BA3A97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "BBDF3A13-582F-43D2-B42F-0DC42D4FBFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "DAF500B3-AA6A-4618-BC7E-0F214B795E0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Argument injection in special agent configuration in Checkmk \u003c2.4.0p1, \u003c2.3.0p32, \u003c2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files"
    },
    {
      "lang": "es",
      "value": "La inyecci\u00f3n de argumentos en la configuraci\u00f3n del agente especial en Checkmk \u0026lt;2.4.0p1, \u0026lt;2.3.0p32, \u0026lt;2.2.0p42 y 2.1.0 permite a atacantes autenticados escribir archivos arbitrarios"
    }
  ],
  "id": "CVE-2025-1712",
  "lastModified": "2025-08-22T19:44:59.790",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.7,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@checkmk.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-21T09:15:35.520",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/17996"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-88"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    }
  ]
}

CVE-2025-58121 (GCVE-0-2025-58121)

Vulnerability from cvelistv5 – Published: 2025-11-18 15:11 – Updated: 2025-11-18 21:34
VLAI?
Summary
Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p16 (semver)
Affected: 2.3.0 (semver)
Affected: 2.2.0 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58121",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T21:33:57.206220Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T21:34:05.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p16",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "2.4.0p16",
                  "versionStartIncluding": "2.4.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T15:11:35.167Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/18983"
        }
      ],
      "title": "Insufficient permission validation on multiple REST API endpoints",
      "x_generator": {
        "engine": "cvelib 1.8.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-58121",
    "datePublished": "2025-11-18T15:11:35.167Z",
    "dateReserved": "2025-08-25T11:50:49.621Z",
    "dateUpdated": "2025-11-18T21:34:05.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-58122 (GCVE-0-2025-58122)

Vulnerability from cvelistv5 – Published: 2025-11-18 15:11 – Updated: 2025-11-18 21:33
VLAI?
Summary
Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p16 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58122",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T21:33:28.717224Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T21:33:35.695Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p16",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "2.4.0p16",
                  "versionStartIncluding": "2.4.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T15:11:17.244Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/18982"
        }
      ],
      "title": "Insufficient permission validation when configuring notification parameters",
      "x_generator": {
        "engine": "cvelib 1.8.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-58122",
    "datePublished": "2025-11-18T15:11:17.244Z",
    "dateReserved": "2025-08-25T11:50:49.622Z",
    "dateUpdated": "2025-11-18T21:33:35.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-64996 (GCVE-0-2025-64996)

Vulnerability from cvelistv5 – Published: 2025-11-18 15:10 – Updated: 2025-11-18 21:23
VLAI?
Summary
In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p16 (semver)
Affected: 2.3.0 , < 2.3.0p41 (semver)
Affected: 2.2.0 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-64996",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T21:22:39.861013Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T21:23:15.114Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p16",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p41",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "2.4.0p16",
                  "versionStartIncluding": "2.4.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "2.3.0p41",
                  "versionStartIncluding": "2.3.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin\u0027s output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T15:10:53.398Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/18570"
        }
      ],
      "title": "Overly broad file permissions in the mk_inotify plugin allows reading and manipulating the plugin\u0027s output",
      "x_generator": {
        "engine": "cvelib 1.8.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-64996",
    "datePublished": "2025-11-18T15:10:53.398Z",
    "dateReserved": "2025-11-12T09:16:24.091Z",
    "dateUpdated": "2025-11-18T21:23:15.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-39663 (GCVE-0-2025-39663)

Vulnerability from cvelistv5 – Published: 2025-10-30 10:43 – Updated: 2025-11-07 16:04
VLAI?
Summary
Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p14 (semver)
Affected: 2.3.0 , < 2.3.0p39 (semver)
Affected: 2.2.0 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
Lisa Gnedt (SBA Research)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-39663",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-30T13:25:54.862081Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-30T13:25:58.384Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-07T16:04:27.994Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://seclists.org/fulldisclosure/2025/Nov/0"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p14",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p39",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Lisa Gnedt (SBA Research)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-Site Scripting (XSS) vulnerability in Checkmk\u0027s distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol)."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592: Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-30T10:44:22.121Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17998"
        },
        {
          "url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
        }
      ],
      "title": "Cross Site Scripting through compromised remote site"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-39663",
    "datePublished": "2025-10-30T10:43:08.500Z",
    "dateReserved": "2025-04-16T07:07:38.256Z",
    "dateUpdated": "2025-11-07T16:04:27.994Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-39664 (GCVE-0-2025-39664)

Vulnerability from cvelistv5 – Published: 2025-10-09 15:01 – Updated: 2025-11-03 17:42
VLAI?
Summary
Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p13 (semver)
Affected: 2.3.0 , < 2.3.0p38 (semver)
Affected: 2.2.0 , < 2.2.0p46 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
Lisa Gnedt (SBA Research)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-39664",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-09T15:11:29.421831Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-14T14:16:32.333Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T17:42:07.064Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://seclists.org/fulldisclosure/2025/Oct/7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p13",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p38",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p46",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Lisa Gnedt (SBA Research)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient escaping in the report scheduler within Checkmk \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-165",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-165 File Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-13T14:25:22.212Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://checkmk.com/werk/17984"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal"
        }
      ],
      "title": "Path-Traversal in report scheduler"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-39664",
    "datePublished": "2025-10-09T15:01:55.877Z",
    "dateReserved": "2025-04-16T07:07:38.256Z",
    "dateUpdated": "2025-11-03T17:42:07.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-32919 (GCVE-0-2025-32919)

Vulnerability from cvelistv5 – Published: 2025-10-09 15:01 – Updated: 2025-11-03 17:32
VLAI?
Summary
Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p13 (semver)
Affected: 2.3.0 , < 2.3.0p38 (semver)
Affected: 2.2.0 , < 2.2.0p46 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
Lisa Gnedt (SBA Research)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32919",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-09T15:11:37.536872Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-14T14:16:45.301Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T17:32:30.502Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://seclists.org/fulldisclosure/2025/Oct/6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p13",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p38",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p46",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Lisa Gnedt (SBA Research)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL)."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233: Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427: Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-13T14:27:22.386Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://checkmk.com/werk/18207"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250724-01_Checkmk_Agent_Privilege_Escalation_via_Insecure_Temporary_Files"
        }
      ],
      "title": "Privilege Escalation in Windows License plugin for Checkmk Windows Agent"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-32919",
    "datePublished": "2025-10-09T15:01:42.606Z",
    "dateReserved": "2025-04-14T09:52:19.273Z",
    "dateUpdated": "2025-11-03T17:32:30.502Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-32916 (GCVE-0-2025-32916)

Vulnerability from cvelistv5 – Published: 2025-10-09 15:00 – Updated: 2025-10-14 14:16
VLAI?
Summary
Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs.
CWE
  • CWE-598 - Use of GET Request Method With Sensitive Query Strings
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p13 (semver)
Affected: 2.3.0 , < 2.3.0p38 (semver)
Affected: 2.2.0 , < 2.2.0p46 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32916",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-09T15:11:44.557098Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-14T14:16:57.077Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p13",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p38",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p46",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Potential use of sensitive information in GET requests in Checkmk GmbH\u0027s Checkmk versions \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-560",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-560: Use of Known Domain Credentials"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-598",
              "description": "CWE-598: Use of GET Request Method With Sensitive Query Strings",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-09T15:00:58.720Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17105"
        }
      ],
      "title": "Sensitive form data in URL query parameters"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-32916",
    "datePublished": "2025-10-09T15:00:58.720Z",
    "dateReserved": "2025-04-14T09:52:19.273Z",
    "dateUpdated": "2025-10-14T14:16:57.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32918 (GCVE-0-2025-32918)

Vulnerability from cvelistv5 – Published: 2025-07-04 08:12 – Updated: 2025-07-08 14:20
VLAI?
Summary
Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions <2.4.0p6, <2.3.0p35, <2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands.
CWE
  • CWE-140 - Improper Neutralization of Delimiters
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p6 (semver)
Affected: 2.3.0 , < 2.3.0p35 (semver)
Affected: 2.2.0 , < 2.2.0p44 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32918",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-08T14:20:18.330549Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-08T14:20:25.426Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p6",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p35",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p44",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions \u003c2.4.0p6, \u003c2.3.0p35, \u003c2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-15",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-15: Command Delimiters"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-140",
              "description": "CWE-140: Improper Neutralization of Delimiters",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-04T08:12:21.950Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17987"
        }
      ],
      "title": "Livestatus injection in autocomplete endpoint"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-32918",
    "datePublished": "2025-07-04T08:12:21.950Z",
    "dateReserved": "2025-04-14T09:52:19.273Z",
    "dateUpdated": "2025-07-08T14:20:25.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32915 (GCVE-0-2025-32915)

Vulnerability from cvelistv5 – Published: 2025-05-22 14:16 – Updated: 2025-05-22 14:48
VLAI?
Summary
Packages downloaded by Checkmk's automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk < 2.4.0p1, < 2.3.0p32, < 2.2.0p42 and <= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p1 (semver)
Affected: 2.3.0 , < 2.3.0p32 (semver)
Affected: 2.2.0 , < 2.2.0p42 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32915",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-22T14:48:27.686173Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-22T14:48:38.894Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p1",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p32",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p42",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Packages downloaded by Checkmk\u0027s automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk \u003c 2.4.0p1, \u003c 2.3.0p32, \u003c 2.2.0p42 and \u003c= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-560",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-560: Use of Known Domain Credentials"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-22T14:16:01.214Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17099"
        }
      ],
      "title": "Sensitive data exposed during automatic agent updates"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-32915",
    "datePublished": "2025-05-22T14:16:01.214Z",
    "dateReserved": "2025-04-14T09:52:19.272Z",
    "dateUpdated": "2025-05-22T14:48:38.894Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-1712 (GCVE-0-2025-1712)

Vulnerability from cvelistv5 – Published: 2025-05-21 09:10 – Updated: 2025-05-21 10:28
VLAI?
Summary
Argument injection in special agent configuration in Checkmk <2.4.0p1, <2.3.0p32, <2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p1 (semver)
Affected: 2.3.0 , < 2.3.0p32 (semver)
Affected: 2.2.0 , < 2.2.0p42 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1712",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-21T10:27:10.883255Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-21T10:28:28.256Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p1",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p32",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p42",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Argument injection in special agent configuration in Checkmk \u003c2.4.0p1, \u003c2.3.0p32, \u003c2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-17",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-17: Using Malicious Files"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-21T09:10:42.626Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17996"
        }
      ],
      "title": "Arbitrary file write with vcrtrace"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-1712",
    "datePublished": "2025-05-21T09:10:42.626Z",
    "dateReserved": "2025-02-26T08:41:33.627Z",
    "dateUpdated": "2025-05-21T10:28:28.256Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-58121 (GCVE-0-2025-58121)

Vulnerability from nvd – Published: 2025-11-18 15:11 – Updated: 2025-11-18 21:34
VLAI?
Summary
Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p16 (semver)
Affected: 2.3.0 (semver)
Affected: 2.2.0 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58121",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T21:33:57.206220Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T21:34:05.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p16",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "2.4.0p16",
                  "versionStartIncluding": "2.4.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T15:11:35.167Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/18983"
        }
      ],
      "title": "Insufficient permission validation on multiple REST API endpoints",
      "x_generator": {
        "engine": "cvelib 1.8.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-58121",
    "datePublished": "2025-11-18T15:11:35.167Z",
    "dateReserved": "2025-08-25T11:50:49.621Z",
    "dateUpdated": "2025-11-18T21:34:05.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-58122 (GCVE-0-2025-58122)

Vulnerability from nvd – Published: 2025-11-18 15:11 – Updated: 2025-11-18 21:33
VLAI?
Summary
Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p16 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58122",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T21:33:28.717224Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T21:33:35.695Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p16",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "2.4.0p16",
                  "versionStartIncluding": "2.4.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T15:11:17.244Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/18982"
        }
      ],
      "title": "Insufficient permission validation when configuring notification parameters",
      "x_generator": {
        "engine": "cvelib 1.8.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-58122",
    "datePublished": "2025-11-18T15:11:17.244Z",
    "dateReserved": "2025-08-25T11:50:49.622Z",
    "dateUpdated": "2025-11-18T21:33:35.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-64996 (GCVE-0-2025-64996)

Vulnerability from nvd – Published: 2025-11-18 15:10 – Updated: 2025-11-18 21:23
VLAI?
Summary
In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p16 (semver)
Affected: 2.3.0 , < 2.3.0p41 (semver)
Affected: 2.2.0 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-64996",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T21:22:39.861013Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T21:23:15.114Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p16",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p41",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "2.4.0p16",
                  "versionStartIncluding": "2.4.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "2.3.0p41",
                  "versionStartIncluding": "2.3.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin\u0027s output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180: Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T15:10:53.398Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/18570"
        }
      ],
      "title": "Overly broad file permissions in the mk_inotify plugin allows reading and manipulating the plugin\u0027s output",
      "x_generator": {
        "engine": "cvelib 1.8.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-64996",
    "datePublished": "2025-11-18T15:10:53.398Z",
    "dateReserved": "2025-11-12T09:16:24.091Z",
    "dateUpdated": "2025-11-18T21:23:15.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-39663 (GCVE-0-2025-39663)

Vulnerability from nvd – Published: 2025-10-30 10:43 – Updated: 2025-11-07 16:04
VLAI?
Summary
Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p14 (semver)
Affected: 2.3.0 , < 2.3.0p39 (semver)
Affected: 2.2.0 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
Lisa Gnedt (SBA Research)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-39663",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-30T13:25:54.862081Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-30T13:25:58.384Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-07T16:04:27.994Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://seclists.org/fulldisclosure/2025/Nov/0"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p14",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p39",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Lisa Gnedt (SBA Research)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-Site Scripting (XSS) vulnerability in Checkmk\u0027s distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol)."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592: Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-30T10:44:22.121Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17998"
        },
        {
          "url": "https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting"
        }
      ],
      "title": "Cross Site Scripting through compromised remote site"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-39663",
    "datePublished": "2025-10-30T10:43:08.500Z",
    "dateReserved": "2025-04-16T07:07:38.256Z",
    "dateUpdated": "2025-11-07T16:04:27.994Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-39664 (GCVE-0-2025-39664)

Vulnerability from nvd – Published: 2025-10-09 15:01 – Updated: 2025-11-03 17:42
VLAI?
Summary
Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p13 (semver)
Affected: 2.3.0 , < 2.3.0p38 (semver)
Affected: 2.2.0 , < 2.2.0p46 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
Lisa Gnedt (SBA Research)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-39664",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-09T15:11:29.421831Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-14T14:16:32.333Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T17:42:07.064Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://seclists.org/fulldisclosure/2025/Oct/7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p13",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p38",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p46",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Lisa Gnedt (SBA Research)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient escaping in the report scheduler within Checkmk \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-165",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-165 File Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-13T14:25:22.212Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://checkmk.com/werk/17984"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal"
        }
      ],
      "title": "Path-Traversal in report scheduler"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-39664",
    "datePublished": "2025-10-09T15:01:55.877Z",
    "dateReserved": "2025-04-16T07:07:38.256Z",
    "dateUpdated": "2025-11-03T17:42:07.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-32919 (GCVE-0-2025-32919)

Vulnerability from nvd – Published: 2025-10-09 15:01 – Updated: 2025-11-03 17:32
VLAI?
Summary
Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p13 (semver)
Affected: 2.3.0 , < 2.3.0p38 (semver)
Affected: 2.2.0 , < 2.2.0p46 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
Lisa Gnedt (SBA Research)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32919",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-09T15:11:37.536872Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-14T14:16:45.301Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T17:32:30.502Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://seclists.org/fulldisclosure/2025/Oct/6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p13",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p38",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p46",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Lisa Gnedt (SBA Research)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL)."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233: Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427: Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-13T14:27:22.386Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://checkmk.com/werk/18207"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250724-01_Checkmk_Agent_Privilege_Escalation_via_Insecure_Temporary_Files"
        }
      ],
      "title": "Privilege Escalation in Windows License plugin for Checkmk Windows Agent"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-32919",
    "datePublished": "2025-10-09T15:01:42.606Z",
    "dateReserved": "2025-04-14T09:52:19.273Z",
    "dateUpdated": "2025-11-03T17:32:30.502Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-32916 (GCVE-0-2025-32916)

Vulnerability from nvd – Published: 2025-10-09 15:00 – Updated: 2025-10-14 14:16
VLAI?
Summary
Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs.
CWE
  • CWE-598 - Use of GET Request Method With Sensitive Query Strings
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p13 (semver)
Affected: 2.3.0 , < 2.3.0p38 (semver)
Affected: 2.2.0 , < 2.2.0p46 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32916",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-09T15:11:44.557098Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-14T14:16:57.077Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p13",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p38",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p46",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Potential use of sensitive information in GET requests in Checkmk GmbH\u0027s Checkmk versions \u003c2.4.0p13, \u003c2.3.0p38, \u003c2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-560",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-560: Use of Known Domain Credentials"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-598",
              "description": "CWE-598: Use of GET Request Method With Sensitive Query Strings",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-09T15:00:58.720Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17105"
        }
      ],
      "title": "Sensitive form data in URL query parameters"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-32916",
    "datePublished": "2025-10-09T15:00:58.720Z",
    "dateReserved": "2025-04-14T09:52:19.273Z",
    "dateUpdated": "2025-10-14T14:16:57.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32918 (GCVE-0-2025-32918)

Vulnerability from nvd – Published: 2025-07-04 08:12 – Updated: 2025-07-08 14:20
VLAI?
Summary
Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions <2.4.0p6, <2.3.0p35, <2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands.
CWE
  • CWE-140 - Improper Neutralization of Delimiters
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p6 (semver)
Affected: 2.3.0 , < 2.3.0p35 (semver)
Affected: 2.2.0 , < 2.2.0p44 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32918",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-08T14:20:18.330549Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-08T14:20:25.426Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p6",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p35",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p44",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions \u003c2.4.0p6, \u003c2.3.0p35, \u003c2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-15",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-15: Command Delimiters"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-140",
              "description": "CWE-140: Improper Neutralization of Delimiters",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-04T08:12:21.950Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17987"
        }
      ],
      "title": "Livestatus injection in autocomplete endpoint"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-32918",
    "datePublished": "2025-07-04T08:12:21.950Z",
    "dateReserved": "2025-04-14T09:52:19.273Z",
    "dateUpdated": "2025-07-08T14:20:25.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32915 (GCVE-0-2025-32915)

Vulnerability from nvd – Published: 2025-05-22 14:16 – Updated: 2025-05-22 14:48
VLAI?
Summary
Packages downloaded by Checkmk's automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk < 2.4.0p1, < 2.3.0p32, < 2.2.0p42 and <= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p1 (semver)
Affected: 2.3.0 , < 2.3.0p32 (semver)
Affected: 2.2.0 , < 2.2.0p42 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32915",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-22T14:48:27.686173Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-22T14:48:38.894Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p1",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p32",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p42",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Packages downloaded by Checkmk\u0027s automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk \u003c 2.4.0p1, \u003c 2.3.0p32, \u003c 2.2.0p42 and \u003c= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-560",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-560: Use of Known Domain Credentials"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-22T14:16:01.214Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17099"
        }
      ],
      "title": "Sensitive data exposed during automatic agent updates"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-32915",
    "datePublished": "2025-05-22T14:16:01.214Z",
    "dateReserved": "2025-04-14T09:52:19.272Z",
    "dateUpdated": "2025-05-22T14:48:38.894Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-1712 (GCVE-0-2025-1712)

Vulnerability from nvd – Published: 2025-05-21 09:10 – Updated: 2025-05-21 10:28
VLAI?
Summary
Argument injection in special agent configuration in Checkmk <2.4.0p1, <2.3.0p32, <2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.4.0 , < 2.4.0p1 (semver)
Affected: 2.3.0 , < 2.3.0p32 (semver)
Affected: 2.2.0 , < 2.2.0p42 (semver)
Affected: 2.1.0 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1712",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-21T10:27:10.883255Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-21T10:28:28.256Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.4.0p1",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.3.0p32",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p42",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Argument injection in special agent configuration in Checkmk \u003c2.4.0p1, \u003c2.3.0p32, \u003c2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-17",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-17: Using Malicious Files"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-21T09:10:42.626Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/17996"
        }
      ],
      "title": "Arbitrary file write with vcrtrace"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2025-1712",
    "datePublished": "2025-05-21T09:10:42.626Z",
    "dateReserved": "2025-02-26T08:41:33.627Z",
    "dateUpdated": "2025-05-21T10:28:28.256Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}