CVE-2025-15616
Received Received - Intake
Shell Injection in Wazuh Agent and Manager Enables Remote Code Execution

Publication date: 2026-03-27

Last updated on: 2026-03-31

Assigner: VulnCheck

Description
Wazuh wazuh-agent and wazuh-manager versions 2.1.0 before 4.8.0 contain multiple shell injection and untrusted search path vulnerabilities that allow attackers to execute arbitrary commands through various components including logcollector configuration, maild SMTP server tags, and Kaspersky AR script parameters. Attackers can exploit these vulnerabilities by injecting malicious commands through configuration files, SMTP server settings, and custom flags to achieve remote code execution on affected systems.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-03-31
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wazuh wazuh From 2.1.0 (inc) to 4.8.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can lead to remote code execution on affected systems, allowing attackers with high privileges to run arbitrary commands.

  • Compromise of system integrity through unauthorized modification.
  • Potential disruption of system availability.
  • Low confidentiality impact but high impact on integrity and availability.

Exploitation requires elevated privileges but no user interaction, and the attack can be performed remotely over the network.


Can you explain this vulnerability to me?

CVE-2025-15616 affects Wazuh wazuh-agent and wazuh-manager versions from 2.1.0 before 4.8.0 and involves multiple shell injection and untrusted search path vulnerabilities.

These vulnerabilities allow attackers to execute arbitrary commands remotely by injecting malicious code through various components such as the logcollector configuration, maild SMTP server tags, and Kaspersky AR script parameters.

Specifically, the issues include executing commands directly from configuration files without proper sanitization, path hijacking attacks where malicious executables can be run instead of legitimate system binaries, and code injection through custom flags.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of CVE-2025-15616 involves checking for the presence of vulnerable Wazuh versions (2.1.0 before 4.8.0) and inspecting configurations that may allow shell injection or untrusted path execution.

Specifically, review the following components for suspicious or malicious entries:

  • wazuh-logcollector configuration files for commands executed directly from configuration.
  • wazuh-maild SMTP server <smtp_server> tags for commands without full path specification.
  • Kaspersky AR script parameters, especially the use of --custom_flags in extra_args.

While no explicit commands are provided in the resources, typical detection steps could include:

  • Checking the version of wazuh-agent and wazuh-manager installed (e.g., using package manager commands or querying the software directly).
  • Searching configuration files for suspicious command injections or untrusted path usage, for example using grep or similar tools to find commands without full paths.
  • Monitoring execution directories (like the ossec-agent folder) for unexpected or malicious executables that could hijack legitimate commands.

What immediate steps should I take to mitigate this vulnerability?

The primary and immediate mitigation step is to upgrade wazuh-agent and wazuh-manager to version 4.8.0 or later, where these vulnerabilities have been patched.

Additional mitigation measures include:

  • Review and sanitize all configuration files, especially those related to logcollector, maild SMTP server tags, and Kaspersky AR script parameters, to ensure no malicious commands or untrusted paths are present.
  • Avoid using relative or incomplete paths in configuration commands to prevent path hijacking.
  • Restrict write permissions to directories where executables are stored (e.g., ossec-agent folder) to prevent attackers from placing malicious binaries.
  • Implement monitoring and alerting for unusual command executions or file changes in critical directories.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to execute arbitrary commands remotely, leading to unauthorized modification (high integrity impact) and potential disruption of system availability (high availability impact).

Such unauthorized access and potential system compromise could negatively affect compliance with standards and regulations like GDPR and HIPAA, which require protection of data integrity and availability.

However, the provided information does not explicitly describe the direct impact on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart