First published: Sat Mar 06 2021(Updated: )
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wazuh | >=4.0.0<=4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26814 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution with administrative privileges.
To fix CVE-2021-26814, upgrade your Wazuh installation to version 4.0.4 or later.
CVE-2021-26814 affects authenticated users of Wazuh versions 4.0.0 to 4.0.3.
CVE-2021-26814 allows for arbitrary code execution via incomplete input validation on the /manager/files API.
Yes, CVE-2021-26814 can be exploited by authenticated users to execute code remotely.