Vulnerability Description
Nagios Log Server before 2024R1.3.2 allows authenticated users (with read-only API access) to stop the Elasticsearch service via a /nagioslogserver/index.php/api/system/stop?subsystem=elasticsearch call. The service stops even though "message": "Could not stop elasticsearch" is in the API response. This is GL:NLS#474.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nagios | Log Server | < 2024 |
Related Weaknesses (CWE)
References
- https://github.com/skraft9/nagios-log-server-dosExploitThird Party Advisory
- https://www.nagios.com/changelog/#log-serverRelease Notes
- https://github.com/skraft9/nagios-log-server-dosExploitThird Party Advisory
FAQ
What is CVE-2025-44824?
CVE-2025-44824 is a vulnerability with a CVSS score of 8.5 (HIGH). Nagios Log Server before 2024R1.3.2 allows authenticated users (with read-only API access) to stop the Elasticsearch service via a /nagioslogserver/index.php/api/system/stop?subsystem=elasticsearch ca...
How severe is CVE-2025-44824?
CVE-2025-44824 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-44824?
Check the references section above for vendor advisories and patch information. Affected products include: Nagios Log Server.