


Perceptive Security
SOC/SIEM Consultancy

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege…
Published:
16 March 2026 at 23:00:00
Alert date:
17 March 2026 at 19:03:08
Source:
nvd.nist.gov
Security Tools
A privilege escalation vulnerability exists in Wazuh versions 3.9.0 through 4.14.2 affecting the cluster synchronization protocol. The wazuh-clusterd service allows authenticated nodes to write arbitrary files with wazuh user permissions. Due to insecure default permissions, attackers can overwrite the main configuration file ossec.conf and inject malicious localfile commands. The wazuh-logcollector service running as root parses this configuration and executes the injected commands, leading to full Root Remote Code Execution. This vulnerability violates the principle of least privilege and bypasses intended security controls. Version 4.14.3 addresses this issue.
Technical details
Mitigation steps:
Affected products:
Wazuh
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-25770
https://github.com/wazuh/wazuh/security/advisories/GHSA-r4f7-v3p6-79jm
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
