CVE-2025-34322
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-17

Last updated on: 2025-11-26

Assigner: VulnCheck

Description
Nagios Log Server versions prior to 2026R1.0.1 contain an authenticated command injection vulnerability in the experimental 'Natural Language Queries' feature. When this feature is configured, certain user-controlled settings—including model selection and connection parameters—are read from the global configuration and concatenated into a shell command that is executed via shell_exec() without proper input handling or command-line argument sanitation. An authenticated user with access to the 'Global Settings' page can supply crafted values in these fields to inject additional shell commands, resulting in arbitrary command execution as the 'www-data' user and compromise of the Log Server host.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-17
Last Modified
2025-11-26
Generated
2026-05-07
AI Q&A
2025-11-17
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
nagios log_server to 2026 (exc)
nagios log_server 2026
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Nagios Log Server versions prior to 2026R1.0.1 and involves an authenticated command injection through the 'Natural Language Queries' feature. Configuration values for this feature are taken from application settings and used in system commands without proper validation or restriction of special characters. An authenticated user with access to global configuration can exploit this to execute arbitrary operating system commands with the privileges of the web server account, potentially compromising the Log Server host.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an authenticated user to execute arbitrary operating system commands on the Log Server host with the privileges of the web server account. This can lead to full compromise of the Log Server host, including unauthorized access, data manipulation, or disruption of services.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart