Skip to main content
  1. Active Vulnerability List/
  2. 2026/

CVE-2026-25769 | Wazuh | RCE

FieldDetails
CVE IDCVE-2026-25769
TitleRemote Code Execution via Insecure Deserialization in Wazuh Cluster
ProductWazuh
Affected ComponentWazuh Cluster (master/worker architecture)
Vulnerability TypeInsecure Deserialization
CWECWE-502
SeverityCritical
CVSS v3.19.1
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Affected VersionsWazuh >= 4.0.0 and < 4.14.3
Patched VersionWazuh 4.14.3
DescriptionA remote code execution vulnerability exists in Wazuh cluster mode due to unsafe deserialization of untrusted data. The vulnerable as_wazuh_object() function processes attacker-controlled __callable__ values, allowing arbitrary module import and function resolution during cluster message handling.
Attack PrerequisitesThe attacker must have access to a compromised Wazuh worker node in a clustered deployment.
Attack VectorA malicious worker sends a crafted DAPI or cluster message to the master node. The master deserializes attacker-controlled data and executes the resulting function.
ImpactRemote code execution on the Wazuh master node with root privileges, potentially leading to full compromise of the monitoring infrastructure.
Exploitation NotesPublic proof-of-concept code is available and demonstrates sending a payload that causes the master to execute arbitrary commands.
MitigationUpgrade Wazuh to version 4.14.3 or later. Restrict and monitor access to worker nodes in clustered environments.
ReferencesWazuh Advisory
PoC Repository
CVE Record
SentinelOne Entry