Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/wazuh/wazuh: CVE-2025-24016 #3459

Open
GoVulnBot opened this issue Feb 10, 2025 · 0 comments
Open

Comments

@GoVulnBot
Copy link

Advisory CVE-2025-24016 references a vulnerability in the following Go modules:

Module
github.com/wazuh/wazuh

Description:
Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using as_wazuh_object (in framework/wazuh/core/cluster/common.py). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (__unhandled_exc__) to evaluate arbitrary python code. The vulnerability can be triggered by anyb...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/wazuh/wazuh
      vulnerable_at: 4.10.1+incompatible
summary: CVE-2025-24016 in github.com/wazuh/wazuh
cves:
    - CVE-2025-24016
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-24016
    - web: https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh
source:
    id: CVE-2025-24016
    created: 2025-02-10T21:01:25.389555587Z
review_status: UNREVIEWED

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants