{"dataType": "CVE_RECORD", "containers": {"cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 9.1, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*"], "vendor": "wazuh", "product": "wazuh", "versions": [{"status": "affected", "version": "4.0.0", "lessThan": "4.14.3", "versionType": "custom"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://drive.google.com/drive/folders/1WlkKNmHexz8212OVED9O6M_3pI8b6qNI?usp=sharing", "tags": ["broken-link"]}, {"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5", "tags": ["exploit", "vendor-advisory"]}], "descriptions": [{"lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue."}, {"lang": "es", "value": "Wazuh es una plataforma gratuita y de código abierto utilizada para la prevención, detección y respuesta a amenazas. Las versiones 4.0.0 a 4.14.2 tienen una vulnerabilidad de Ejecución Remota de Código (RCE) debido a la Deserialización de Datos No Confiables. Todas las implementaciones de Wazuh que utilizan el modo clúster (arquitectura maestro/trabajador) y cualquier organización con un nodo trabajador comprometido (p. ej., a través de acceso inicial, amenaza interna o ataque a la cadena de suministro) se ven afectadas. Un atacante que obtiene acceso a un nodo trabajador (por cualquier medio) puede lograr RCE completa en el nodo maestro con privilegios de root. La versión 4.14.3 soluciona el problema."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-502", "description": "CWE-502"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2026-03-17T18:16:15Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2026-25769", "state": "PUBLISHED", "dateUpdated": "2026-03-19T17:18:30Z", "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "datePublished": "2026-03-17T18:16:15Z", "assignerShortName": "GitHub_M"}, "dataVersion": "5.0"}