Vulnerability Description
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nagios | Nagios Xi | <= 2024 |
Related Weaknesses (CWE)
References
- https://www.nagios.com/changelog/nagios-xi/2026r1-1/Release Notes
- https://www.vulncheck.com/advisories/nagios-xi-privilege-escalation-via-writableThird Party Advisory
FAQ
What is CVE-2025-34288?
CVE-2025-34288 is a vulnerability with a CVSS score of 6.7 (MEDIUM). Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance ...
How severe is CVE-2025-34288?
CVE-2025-34288 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-34288?
Check the references section above for vendor advisories and patch information. Affected products include: Nagios Nagios Xi.