
Cloud Vulnerability DB
A community-led vulnerabilities database
Nagios XI versions prior to 2024R2 contain a command injection vulnerability in the WinRM plugin (CVE-2025-34284). The vulnerability was discovered and disclosed on October 30, 2025. The issue affects all Nagios XI installations before version 2024R2 and stems from insufficient validation of user-supplied parameters in the WinRM plugin (VulnCheck Advisory).
The vulnerability is a command injection flaw (CWE-78) that occurs due to improper validation of user-supplied parameters in the WinRM plugin. When these parameters contain shell metacharacters, they are incorporated into backend command invocations without proper sanitization. The vulnerability has received a CVSS v4.0 base score of 9.4 (Critical) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H, indicating high severity across multiple impact categories (VulnCheck Advisory).
Successful exploitation of this vulnerability enables arbitrary command execution with the privileges of the Nagios XI web application user. Attackers can leverage this access to modify configuration, exfiltrate data, disrupt monitoring operations, or execute commands on the underlying host operating system (VulnCheck Advisory).
The vulnerability has been patched in Nagios XI version 2024R2. Organizations running affected versions should upgrade to version 2024R2 or later to remediate this security issue (Nagios Changelog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."