Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster Protocol
CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster Protocol

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-25769

CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster Protocol

A critical remote code execution vulnerability (CVSS 9.1) in Wazuh versions 4.0.0–4.14.2 allows an attacker with access to a worker node to achieve root...

Dylan H.

Security Team

March 18, 2026
6 min read

Affected Products

  • Wazuh 4.0.0 – 4.14.2 (cluster mode deployments)

CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization

A critical remote code execution (RCE) vulnerability has been disclosed in Wazuh, the widely deployed open-source security information and event management (SIEM) and XDR platform. Tracked as CVE-2026-25769 (CVSS 9.1, Critical), the flaw affects all Wazuh cluster deployments running versions 4.0.0 through 4.14.2 and stems from insecure deserialization of attacker-controlled data in the inter-cluster communication protocol.

The vulnerability was patched in Wazuh 4.14.3, released March 17, 2026. Mirai botnet variants have been observed targeting related Wazuh deserialization flaws, and organizations running exposed Wazuh clusters should treat this as an emergency.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-25769
CVSS Score9.1 (Critical)
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CWE ClassificationCWE-502 — Deserialization of Untrusted Data
GHSA IDGHSA-3gm7-962f-fxw5
Affected SoftwareWazuh 4.0.0 – 4.14.2 (cluster mode only)
Fixed VersionWazuh 4.14.3
Attack VectorNetwork
Authentication RequiredHigh (attacker must control a cluster worker node)
ScopeChanged — master node impacted from compromised worker
In-the-Wild ExploitationRelated campaigns active; Mirai botnet weaponization confirmed
Patch AvailableYes — March 17, 2026

Technical Analysis

Vulnerable Code Path

The vulnerability resides in framework/wazuh/core/cluster/common.py within the as_wazuh_object() function. This function acts as the object_hook callback in json.loads() calls used to deserialize inter-cluster messages flowing between Wazuh worker and master nodes.

When a deserialized JSON object contains a __callable__ key, the function performs the following sequence without any whitelist validation:

  1. Reads __module__ directly from attacker-controlled cluster message data
  2. Calls import_module() on any arbitrary module name supplied
  3. Retrieves an arbitrary attribute (function) via getattr()
  4. Returns the callable — which is subsequently invoked by the cluster framework

The lack of a module allowlist means any importable Python standard library or installed package can be targeted, enabling arbitrary code execution with the process's effective privileges.

Exploit Chain

1. Attacker achieves code execution on a Wazuh worker node
   (via phishing, CVE chain, or insider threat)
 
2. Crafts a malicious cluster sync message containing:
   a __callable__ key pointing to an arbitrary Python callable
   with attacker-controlled arguments
 
3. Sends the crafted message to the master node via cluster protocol (port 1516)
 
4. Master node's as_wazuh_object() deserializes the message,
   imports the attacker-specified module, and retrieves the function
 
5. The cluster framework invokes the returned callable
 
6. Arbitrary code executes with the privileges of wazuh-clusterd
   (typically root or a highly privileged service account)
 
7. Attacker achieves full root RCE on the Wazuh master node

Affected Deployments

This vulnerability only affects Wazuh deployments running in cluster mode (master/worker architecture). Standalone single-node deployments are not directly vulnerable to the remote vector described above.

Organizations at elevated risk include:

  • Enterprises running multi-node Wazuh clusters for high availability
  • MSSPs managing distributed Wazuh infrastructure across client environments
  • SOC environments where Wazuh master nodes aggregate data from multiple worker nodes across network segments

The Wazuh ecosystem is widely deployed globally, with hundreds of thousands of active cluster installations. The master node typically holds all aggregated security event data — making RCE on the master a high-impact compromise.


Impact Assessment

Impact AreaDescription
ConfidentialityAll security events, agent data, and collected logs on the master node are exposed
IntegrityAttacker can tamper with detection rules, suppress alerts, and corrupt event data
AvailabilityFull service disruption of the SIEM/XDR platform; persistent backdoor installation
Lateral MovementMaster node credentials and API keys could enable lateral movement across monitored environments
Detection EvasionCompromising the security monitoring platform itself provides the highest-impact blind spot
PrerequisiteRequires prior access to a worker node — but many Wazuh clusters expose worker nodes across network segments

Remediation

Primary Fix: Upgrade to Wazuh 4.14.3

# Upgrade Wazuh manager (all nodes — workers first, then master)
apt-get update && apt-get install wazuh-manager=4.14.3-*
# or
yum update wazuh-manager-4.14.3
 
# Restart the cluster daemon after upgrading
systemctl restart wazuh-manager
 
# Verify version
/var/ossec/bin/wazuh-control info | grep -i version

Upgrade worker nodes before the master to prevent version mismatch issues during cluster sync protocol negotiation.

Network Segmentation (Immediate Mitigation)

If immediate patching is not possible, restrict access to cluster communication port 1516/TCP to only trusted Wazuh cluster members via firewall rules. No untrusted systems should be able to reach the cluster inter-node communication port.

Detection

Monitor for suspicious process spawning from the wazuh-clusterd service, especially unexpected child processes or outbound network connections:

# Review recent wazuh-clusterd logs for errors or anomalies
journalctl -u wazuh-manager --since "24 hours ago" | grep -i "cluster\|error\|exception"
 
# Check active network connections on the cluster port
ss -tlnp | grep 1516
netstat -anp | grep 1516

Unexpected network connections originating from the Wazuh master on unusual outbound ports should be investigated as potential post-exploitation indicators.


Key Takeaways

  1. CVE-2026-25769 allows an attacker controlling a Wazuh worker node to execute arbitrary code as root on the cluster master via insecure deserialization in as_wazuh_object() — no module whitelist is enforced
  2. CVSS 9.1 (Critical) — network-reachable, no user interaction required, scope change to master from compromised worker
  3. Mirai botnet campaigns have been observed targeting related Wazuh deserialization vulnerabilities — active exploitation is a near-certainty for exposed deployments
  4. Only cluster mode deployments are affected (versions 4.0.0–4.14.2); standalone nodes face the same risk if a cluster worker is compromised
  5. Patch immediately to Wazuh 4.14.3 — or isolate cluster port 1516 as an emergency measure
  6. Post-compromise of a SIEM platform is an attacker's ideal position — full visibility into your security posture with no detection

Sources

  • CVE-2026-25769 — NIST NVD
  • GHSA-3gm7-962f-fxw5 — Wazuh RCE via Insecure Deserialization (GitHub Advisory)
  • CVE-2026-25769: RCE via Insecure Deserialization in Wazuh Cluster — Hakai Security
  • Wazuh RCE via Deserialization of Untrusted Data — TheHackerWire
  • CVE-2026-25769 — CIRCL Vulnerability Lookup
  • Exploitation of Critical Wazuh RCE Leading to Mirai Deployment — GBHackers
#Wazuh#RCE#Deserialization#CVE-2026-25769#CWE-502#SIEM#Vulnerability#Critical

Related Articles

CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write

A critical privilege escalation vulnerability (CVSS 9.1) in Wazuh versions 3.9.0–4.14.2 allows authenticated cluster nodes to overwrite the manager...

5 min read

CVE-2026-25449: Critical Object Injection in Shinetheme Traveler WordPress Plugin

A CVSS 9.8 deserialization vulnerability in the Shinetheme Traveler WordPress plugin allows unauthenticated remote attackers to inject arbitrary PHP...

6 min read

Mail2Shell: Zero-Click RCE in FreeScout Helpdesk

A maximum-severity zero-click vulnerability dubbed Mail2Shell allows unauthenticated attackers to compromise FreeScout mail servers by simply sending a...

7 min read
Back to all Security Alerts