๐Ÿ” CVE Alert

CVE-2026-25790

MEDIUM 4.9

Wazuh has Stack-Based Buffer Overflow in Security Configuration Assessment JSON Parser

CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, multiple stack-based buffer overflows exist in the Security Configuration Assessment (SCA) decoder (`wazuh-analysisd`). The use of `sprintf` with a floating-point (`%lf`) format specifier on a fixed-size 128-byte buffer allows a remote attacker to overflow the stack. A specially crafted JSON event can trigger this overflow, leading to a denial of service (crash) or potential RCE on the Wazuh manager. The vulnerability is located in `/src/analysisd/decoders/security_configuration_assessment.c`, within the `FillScanInfo` and `FillCheckEventInfo` functions. In multiple locations, a 128-byte buffer (`char value[OS_SIZE_128];`) is allocated on the stack to hold the string representation of a number from a JSON event. The code checks if the number is an integer or a double. If it's a double, it uses `sprintf(value, "%lf", ...)` to perform the conversion. This `sprintf` call is unbounded. If a floating-point number with a large exponent (e.g., `1.0e150`) is provided, `sprintf` will attempt to write its full string representation (a "1" followed by 150 zeros), which is larger than the 128-byte buffer, corrupting the stack. Version 4.14.3 patches the issue.

CWE CWE-121 CWE-787
Vendor wazuh
Product wazuh
Published Mar 17, 2026
Last Updated Mar 18, 2026
Stay Ahead of the Next One

Get instant alerts for wazuh wazuh

Be the first to know when new medium vulnerabilities affecting wazuh wazuh are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

wazuh / wazuh
>= 3.9.0, < 4.14.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/wazuh/wazuh/security/advisories/GHSA-cf24-hq8x-5jx2