🔐 CVE Alert

CVE-2025-34323

UNKNOWN 0.0

Nagios Log Server < 2026R1.0.1 Local Privilege Escalation via Writable Scripts and Sudo Rules

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to a combination of sudo misconfiguration and group-writable application directories. The 'www-data' user is a member of the 'nagios' group, which has write access to '/usr/local/nagioslogserver/scripts', while several scripts in this directory are owned by root and may be executed via sudo without a password. A local attacker running as 'www-data' can move one of these root-owned scripts to a backup name and create a replacement script with attacker-controlled content at the original path, then invoke it with sudo. This allows arbitrary commands to be executed with root privileges, providing full compromise of the underlying operating system.

CWE CWE-732
Vendor nagios
Product log server
Published Nov 17, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for nagios log server

Be the first to know when new unknown vulnerabilities affecting nagios log server are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Nagios / Log Server
0 < 2026R1.0.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
nagios.com: https://www.nagios.com/products/security/#log-server nagios.com: https://www.nagios.com/changelog/nagios-log-server/nagios-log-server-2026r1-0-1/ vulncheck.com: https://www.vulncheck.com/advisories/nagios-log-server-local-privilege-escalation-via-writable-scripts-and-sudo-rules theyhack.me: https://theyhack.me/Rooting-Nagios-Log-Server/

Credits

M. Cory Billington of theyhack.me