CVE-2025-24016

The Watchman Who Left the Gate Open: Wazuh RCE Analysis

Alon Barad
Alon Barad
Software Engineer

Jan 15, 2026·6 min read·46 visits

Executive Summary (TL;DR)

Wazuh, the popular open-source SIEM, contains a fatal flaw in how it processes JSON data between cluster nodes. By sending a specially crafted request with an `__unhandled_exc__` key, an attacker can trick the server into instantiating arbitrary Python classes. This leads to full RCE as the `wazuh` user. The vulnerability is actively exploited by Mirai botnets. Patch immediately to version 4.9.1.

A critical Remote Code Execution (RCE) vulnerability in Wazuh Manager allows unauthenticated attackers to execute arbitrary commands via the Distributed API. This flaw arises from insecure deserialization logic where the system blindly trusts user-supplied data to reconstruct Python exceptions.

Fix Analysis (1)

Technical Appendix

CVSS Score
9.9/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
EPSS Probability
93.40%
Top 0% most exploited
5,000
via Shodan

Affected Systems

Wazuh Manager (4.4.0 - 4.9.0)

Affected Versions Detail

Product
Affected Versions
Fixed Version
Wazuh Manager
Wazuh
>= 4.4.0, < 4.9.14.9.1
AttributeDetail
CWE IDCWE-502 (Deserialization of Untrusted Data)
CVSS v3.19.9 (Critical)
Attack VectorNetwork (API)
Privileges RequiredNone / Low
EPSS Score0.93 (93.40%)
Exploit StatusActive / Weaponized
KEV ListedYes (2025-06-10)
CWE-502
Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

Vulnerability Timeline

Vulnerability Disclosed / CVE Assigned
2025-02-10
Initial Exploitation in Wild Observed
2025-03-01
Patch Released (v4.9.1)
2025-05-21
Added to CISA KEV
2025-06-10