Wazuh, a top provider of open-source security solutions, has released a critical security advisory for a remote code execution vulnerability (RCE) (CVE-2025-24016) with a CVSS score of 9.9. This flaw could enable attackers to take full control of affected Wazuh servers.
Wazuh is a popular platform for threat prevention, detection, and response, offering features like log analysis, intrusion detection, file integrity monitoring, and vulnerability assessment. The recent advisory highlights a vulnerability in the Wazuh server’s API due to unsafe deserialization. An attacker could exploit this by sending a crafted request, potentially allowing arbitrary code execution.
By infosecbulletin
/ Sunday , July 20 2025
Hewlett-Packard Enterprise (HPE) warns that Aruba Instant On Access Points have hardcoded credentials, enabling attackers to skip normal authentication and...
Read More
By infosecbulletin
/ Sunday , July 20 2025
The Akira ransomware group increased its attacks, adding 12 new victims to its dark web portal from July 15 to...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Defence Minister Chan Chun Sing said these select units will work with the Cyber Security Agency (CSA) in a united...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Google is suing 25 unidentified cybercriminals thought to be from China for running BADBOX 2.0, a major global botnet with...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Oracle's July 2025 Critical Patch Update includes 309 new security patches, with 127 addressing remotely exploitable vulnerabilities. SecurityWeek found about...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Cybersecurity researchers have revealed a new malware named MDifyLoader, linked to cyber attacks using security vulnerabilities in Ivanti Connect Secure...
Read More
By infosecbulletin
/ Saturday , July 19 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a crucial vulnerability in Fortinet FortiWeb in its Known Exploited Vulnerabilities...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Security researcher Jeremiah Fowler discovered an online database exposing sensitive information from an adoption agency. Jeremiah Fowler Jeremiah specializes in...
Read More
By infosecbulletin
/ Friday , July 18 2025
A critical vulnerability in Cisco Identity Services Engine (ISE) and Cisco ISE-PIC, identified as CVE-2025-20337, has a CVSS score of...
Read More
By infosecbulletin
/ Thursday , July 17 2025
On Tuesday, Bangladesh Bank organized a special award ceremony at its headquarters in Dhaka to formally recognize and honor a...
Read More
“The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent,” the advisory states.
The advisory shows a proof-of-concept (PoC) exploit that allows an attacker to shut down the Wazuh master server using its API. This command can instantly turn off the server, highlighting how easy it is to exploit this vulnerability with default credentials.
“curl -X POST -k -u “wazuh-wui:MyS3cr37P450r.*-” -H “Content-Type: application/json” –data ‘{“__unhandled_exc__”:{“__class__”: “exit”, “__args__”: []}}’ https://<worker-server>:55000/security/user/authenticate/run_as”
Security researcher DanielFi reported this vulnerability.
Wazuh has fixed the CVE-2025-24016 vulnerability in version 4.9.1. Administrators should update immediately to reduce risk. The advisory stresses addressing the root cause instead of just sanitization, as there may be other methods to execute arbitrary code. Organizations should also review API permissions and strengthen agent configurations to prevent exploitation.
Microsoft 2025 February Patch Tuesday fixes 2 zero-days, 55 flaws