Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-32917

Summary
Assigner-Checkmk
Assigner Org ID-f7d6281c-4801-44ce-ace2-493291dedb0f
Published At-13 May, 2025 | 10:45
Updated At-13 May, 2025 | 13:05
Rejected At-
Credits

Privilege escalation in jar_signature

Privilege escalation in jar_signature agent plugin in Checkmk versions <2.4.0b7 (beta), <2.3.0p32, <2.2.0p42, and 2.1.0p49 (EOL) allow user with write access to JAVA_HOME/bin directory to escalate privileges.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Checkmk
Assigner Org ID:f7d6281c-4801-44ce-ace2-493291dedb0f
Published At:13 May, 2025 | 10:45
Updated At:13 May, 2025 | 13:05
Rejected At:
▼CVE Numbering Authority (CNA)
Privilege escalation in jar_signature

Privilege escalation in jar_signature agent plugin in Checkmk versions <2.4.0b7 (beta), <2.3.0p32, <2.2.0p42, and 2.1.0p49 (EOL) allow user with write access to JAVA_HOME/bin directory to escalate privileges.

Affected Products
Vendor
Checkmk GmbHCheckmk GmbH
Product
Checkmk
Default Status
unaffected
Versions
Affected
  • From 2.4.0 before 2.4.0b7 (semver)
  • From 2.3.0 before 2.3.0p32 (semver)
  • From 2.2.0 before 2.2.0p42 (semver)
  • From 2.1.0 through 2.1.0p50 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-427CWE-427 Uncontrolled Search Path Element
Type: CWE
CWE ID: CWE-427
Description: CWE-427 Uncontrolled Search Path Element
Metrics
VersionBase scoreBase severityVector
4.05.2MEDIUM
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
Version: 4.0
Base score: 5.2
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-233CAPEC-233 Privilege Escalation
CAPEC ID: CAPEC-233
Description: CAPEC-233 Privilege Escalation
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://checkmk.com/werk/17985
N/A
Hyperlink: https://checkmk.com/werk/17985
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@checkmk.com
Published At:13 May, 2025 | 11:15
Updated At:22 Aug, 2025 | 20:26

Privilege escalation in jar_signature agent plugin in Checkmk versions <2.4.0b7 (beta), <2.3.0p32, <2.2.0p42, and 2.1.0p49 (EOL) allow user with write access to JAVA_HOME/bin directory to escalate privileges.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.2MEDIUM
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 5.2
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.1.0
cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-427Secondarysecurity@checkmk.com
CWE ID: CWE-427
Type: Secondary
Source: security@checkmk.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://checkmk.com/werk/17985security@checkmk.com
Vendor Advisory
Hyperlink: https://checkmk.com/werk/17985
Source: security@checkmk.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

21Records found

CVE-2023-31210
Matching Score-10
Assigner-Checkmk GmbH
ShareView Details
Matching Score-10
Assigner-Checkmk GmbH
CVSS Score-8.8||HIGH
EPSS-0.12% / 32.06%
||
7 Day CHG~0.00%
Published-13 Dec, 2023 | 08:26
Updated-02 Dec, 2024 | 14:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation in agent via LD_LIBRARY_PATH

Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-46836
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-9.1||CRITICAL
EPSS-0.79% / 72.89%
||
7 Day CHG~0.00%
Published-20 Feb, 2023 | 16:52
Updated-03 Aug, 2024 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHP code injection in watolib

PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.

Action-Not Available
Vendor-tribe29 GmbHCheckmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-6157
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-7.6||HIGH
EPSS-0.38% / 58.69%
||
7 Day CHG~0.00%
Published-22 Nov, 2023 | 16:24
Updated-02 Aug, 2024 | 08:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Livestatus injection in ajax_search

Improper neutralization of livestatus command delimiters in ajax_search in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-140
Improper Neutralization of Delimiters
CVE-2023-6156
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-7.6||HIGH
EPSS-0.38% / 58.69%
||
7 Day CHG~0.00%
Published-22 Nov, 2023 | 16:24
Updated-02 Aug, 2024 | 08:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Livestatus injection in availability timeline

Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-140
Improper Neutralization of Delimiters
CVE-2025-32918
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 17.85%
||
7 Day CHG~0.00%
Published-04 Jul, 2025 | 08:12
Updated-22 Aug, 2025 | 13:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Livestatus injection in autocomplete endpoint

Improper neutralization of Livestatus command delimiters in autocomplete endpoint within the RestAPI of Checkmk versions <2.4.0p6, <2.3.0p35, <2.2.0p44, and 2.1.0 (EOL) allows an authenticated user to inject arbitrary Livestatus commands.

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-140
Improper Neutralization of Delimiters
CVE-2025-1712
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-8.7||HIGH
EPSS-0.07% / 22.72%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 09:10
Updated-22 Aug, 2025 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary file write with vcrtrace

Argument injection in special agent configuration in Checkmk <2.4.0p1, <2.3.0p32, <2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2023-31209
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-8.8||HIGH
EPSS-0.56% / 67.25%
||
7 Day CHG~0.00%
Published-10 Aug, 2023 | 08:14
Updated-28 Aug, 2024 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command injection via active checks and REST API

Improper neutralization of active check command arguments in Checkmk < 2.1.0p32, < 2.0.0p38, < 2.2.0p4 leads to arbitrary command execution for authenticated users.

Action-Not Available
Vendor-tribe29 GmbHCheckmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2023-31208
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-8.3||HIGH
EPSS-0.51% / 65.49%
||
7 Day CHG~0.00%
Published-17 May, 2023 | 08:24
Updated-21 Jan, 2025 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Livestatus command injection in RestAPI

Improper neutralization of livestatus command delimiters in the RestAPI in Checkmk < 2.0.0p36, < 2.1.0p28, and < 2.2.0b8 (beta) allows arbitrary livestatus command execution for authorized users.

Action-Not Available
Vendor-tribe29 GmbHCheckmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-140
Improper Neutralization of Delimiters
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2023-31211
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-8.8||HIGH
EPSS-0.12% / 32.00%
||
7 Day CHG~0.00%
Published-12 Jan, 2024 | 07:49
Updated-17 Jun, 2025 | 21:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Disabled automation users could still authenticate

Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials

Action-Not Available
Vendor-Checkmk GmbHtribe29 GmbH
Product-checkmkCheckmk
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2024-38865
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-6||MEDIUM
EPSS-0.13% / 33.37%
||
7 Day CHG+0.01%
Published-10 Apr, 2025 | 07:35
Updated-21 Aug, 2025 | 21:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Livestatus command injection in RestAPI

Improper neutralization of livestatus command delimiters in a specific endpoint within RestAPI of Checkmk prior to 2.2.0p39, 2.3.0p25, and 2.1.0p51 (EOL) allows arbitrary livestatus command execution. Exploitation requires the attacker to have a contact group assigned to their user account and for an event to originate from a host with the same contact group or from an event generated with an unknown host.

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-140
Improper Neutralization of Delimiters
CVE-2024-28826
Matching Score-8
Assigner-Checkmk GmbH
ShareView Details
Matching Score-8
Assigner-Checkmk GmbH
CVSS Score-8.8||HIGH
EPSS-0.43% / 61.59%
||
7 Day CHG~0.00%
Published-29 May, 2024 | 10:00
Updated-04 Dec, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unrestricted upload and download paths in check_sftp

Improper restriction of local upload and download paths in check_sftp in Checkmk before 2.3.0p4, 2.2.0p27, 2.1.0p44, and in Checkmk 2.0.0 (EOL) allows attackers with sufficient permissions to configure the check to read and write local files on the Checkmk site server.

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmkcheckmk
CWE ID-CWE-73
External Control of File Name or Path
CWE ID-CWE-610
Externally Controlled Reference to a Resource in Another Sphere
CVE-2024-0670
Matching Score-6
Assigner-Checkmk GmbH
ShareView Details
Matching Score-6
Assigner-Checkmk GmbH
CVSS Score-8.8||HIGH
EPSS-0.07% / 21.62%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 14:50
Updated-13 Feb, 2025 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation in windows agent

Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges

Action-Not Available
Vendor-Microsoft CorporationCheckmk GmbH
Product-windowscheckmkCheckmkcheckmk
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-6740
Matching Score-6
Assigner-Checkmk GmbH
ShareView Details
Matching Score-6
Assigner-Checkmk GmbH
CVSS Score-8.8||HIGH
EPSS-0.03% / 5.81%
||
7 Day CHG~0.00%
Published-12 Jan, 2024 | 07:50
Updated-03 Jun, 2025 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation in jar_signature

Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges

Action-Not Available
Vendor-tribe29 GmbHCheckmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-427
Uncontrolled Search Path Element
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-43440
Matching Score-6
Assigner-Checkmk GmbH
ShareView Details
Matching Score-6
Assigner-Checkmk GmbH
CVSS Score-8.8||HIGH
EPSS-0.06% / 18.61%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 08:30
Updated-24 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation via manipulated unixcat executable

Uncontrolled Search Path Element in Checkmk Agent in Tribe29 Checkmk before 2.1.0p1, before 2.0.0p25 and before 1.6.0p29 on a Checkmk server allows the site user to escalate privileges via a manipulated unixcat executable

Action-Not Available
Vendor-tribe29 GmbHCheckmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-2005
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.07% / 20.41%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 17:39
Updated-03 Dec, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenable Plugin Feed ID #202306261202 Fixes Privilege Escalation Vulnerability

Vulnerability in Tenable Tenable.Io, Tenable Nessus, Tenable Security Center.This issue affects Tenable.Io: before Plugin Feed ID #202306261202 ; Nessus: before Plugin Feed ID #202306261202 ; Security Center: before Plugin Feed ID #202306261202 . This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges.

Action-Not Available
Vendor-Tenable, Inc.
Product-tenable.iosecuritycenternessusSecurity CenterTenable.ioNessus
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-36004
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 17.85%
||
7 Day CHG~0.00%
Published-25 Jun, 2025 | 02:32
Updated-24 Aug, 2025 | 11:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM i privilege escalation

IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user to gain elevated privileges due to an unqualified library call in IBM Facsimile Support for i. A malicious actor could cause user-controlled code to run with administrator privilege.

Action-Not Available
Vendor-IBM Corporation
Product-ii
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-41117
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.08% / 23.43%
||
7 Day CHG~0.00%
Published-12 Dec, 2023 | 00:00
Updated-27 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contain packages, standalone packages, and functions that run SECURITY DEFINER but are inadequately secured against search_path attacks.

Action-Not Available
Vendor-enterprisedbn/a
Product-postgres_advanced_servern/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-4313
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-8.8||HIGH
EPSS-0.22% / 44.51%
||
7 Day CHG~0.00%
Published-15 Mar, 2023 | 00:00
Updated-27 Feb, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported where through modifying the scan variables, an authenticated user in Tenable products, that has Scan Policy Configuration roles, could manipulate audit policy variables to execute arbitrary commands on credentialed scan targets.

Action-Not Available
Vendor-n/aTenable, Inc.
Product-plugin_feednessusTenable.io, Tenable.sc and Nessus
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-39286
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.47% / 63.80%
||
7 Day CHG+0.03%
Published-26 Oct, 2022 | 00:00
Updated-23 Apr, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Execution with Unnecessary Privileges in JupyterApp

Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds.

Action-Not Available
Vendor-jupyterjupyterFedora ProjectDebian GNU/Linux
Product-debian_linuxfedorajupyter_corejupyter_core
CWE ID-CWE-250
Execution with Unnecessary Privileges
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-23554
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.07% / 23.00%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 00:00
Updated-06 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled search path element vulnerability exists in pg_ivm versions prior to 1.5.1. When refreshing an IMMV, pg_ivm executes functions without specifying schema names. Under certain conditions, pg_ivm may be tricked to execute unexpected functions from other schemas with the IMMV owner's privilege. If this vulnerability is exploited, an unexpected function provided by an attacker may be executed with the privilege of the materialized view owner.

Action-Not Available
Vendor-sraossIVM Development Group
Product-pg_ivmpg_ivm
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2017-20123
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.8||HIGH
EPSS-0.61% / 68.76%
||
7 Day CHG~0.00%
Published-30 Jun, 2022 | 05:05
Updated-15 Apr, 2025 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Viscosity DLL untrusted search path

A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This affects an unknown part of the component DLL Handler. The manipulation leads to untrusted search path. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.8 is able to address this issue. It is recommended to upgrade the affected component.

Action-Not Available
Vendor-sparklabsunspecifiedMicrosoft Corporation
Product-windowsviscosityViscosity
CWE ID-CWE-426
Untrusted Search Path
CWE ID-CWE-427
Uncontrolled Search Path Element
Details not found