🔐 CVE Alert

CVE-2026-25770

CRITICAL 9.1

Wazuh has Privilege Escalation to Root via Cluster Protocol File Write

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege escalation vulnerability exists in the Wazuh Manager's cluster synchronization protocol. The `wazuh-clusterd` service allows authenticated nodes to write arbitrary files to the manager’s file system with the permissions of the `wazuh` system user. Due to insecure default permissions, the `wazuh` user has write access to the manager's main configuration file (`/var/ossec/etc/ossec.conf`). By leveraging the cluster protocol to overwrite `ossec.conf`, an attacker can inject a malicious `<localfile>` command block. The `wazuh-logcollector` service, which runs as root, parses this configuration and executes the injected command. This chain allows an attacker with cluster credentials to gain full Root Remote Code Execution, violating the principle of least privilege and bypassing the intended security model. Version 4.14.3 fixes the issue.

CWE CWE-22 CWE-269 CWE-732
Vendor wazuh
Product wazuh
Published Mar 17, 2026
Last Updated Mar 18, 2026
Stay Ahead of the Next One

Get instant alerts for wazuh wazuh

Be the first to know when new critical vulnerabilities affecting wazuh wazuh are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

wazuh / wazuh
>= 3.9.0, < 4.14.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/wazuh/wazuh/security/advisories/GHSA-r4f7-v3p6-79jm