Nagios XI <5.7.3 getprofile.sh PrivEsc via Insecure Input
CVE-2020-36868 Published on October 30, 2025

Nagios XI < 5.7.3 Privilege escalation via Insecure getprofile.sh Script
Nagios XI versions prior to 5.7.3 contain a privilege escalation vulnerability in the getprofile.sh helper script. The script performed profile retrieval and initialization routines using insecure file/command handling and insufficient validation of attacker-controlled inputs, and in some deployments executed with elevated privileges. A local attacker with low-level access could exploit these weaknesses to cause the script to execute arbitrary commands or modify privileged files, resulting in privilege escalation.

NVD

Weakness Types

External Control of File Name or Path

The software allows user input to control or influence paths or file names that are used in filesystem operations.

Execution with Unnecessary Privileges

The software performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.


Products Associated with CVE-2020-36868

stack.watch emails you whenever new vulnerabilities are published in Nagios Xi or Nagios Xi. Just hit a watch button to start following.

 
 

Affected Versions

Nagios XI:

Exploit Probability

EPSS
0.05%
Percentile
14.07%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.