Wazuh 漏洞列表
共找到 4 个与 Wazuh 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2025-24016: Wazuh - Unsafe Deserialization Remote Code Execution POC
A critical Remote Code Execution (RCE) vulnerability exists in Wazuh server versions >= 4.4.0 and < 4.9.1. The vulnerability occurs due to unsafe deserialization in the wazuh-manager package, specifically in the DistributedAPI where parameters are serialized as JSON and deserialized using as_wazuh_object in the framework/wazuh/core/cluster/common.py file. An attacker with API access can exploit this vulnerability by injecting an unsanitized dictionary into DAPI requests, leading to arbitrary Python code execution. -
CVE-2025-24016: Wazuh - Unsafe Deserialization Remote Code Execution POC
A critical Remote Code Execution (RCE) vulnerability exists in Wazuh server versions >= 4.4.0 and < 4.9.1. The vulnerability occurs due to unsafe deserialization in the wazuh-manager package, specifically in the DistributedAPI where parameters are serialized as JSON and deserialized using as_wazuh_object in the framework/wazuh/core/cluster/common.py file. An attacker with API access can exploit this vulnerability by injecting an unsanitized dictionary into DAPI requests, leading to arbitrary Python code execution. -
wazuh-default-login: Wazuh - Default Login POC
Wazuh contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations. -
Wazuh CVE-2022-40497 远程代码执行漏洞 无POC