Nagios XI <5.7.3 getprofile.sh PrivEsc via Insecure Input
CVE-2020-36868 Published on October 30, 2025
Nagios XI < 5.7.3 Privilege escalation via Insecure getprofile.sh Script
Nagios XI versions prior to 5.7.3 contain a privilege escalation vulnerability in the getprofile.sh helper script. The script performed profile retrieval and initialization routines using insecure file/command handling and insufficient validation of attacker-controlled inputs, and in some deployments executed with elevated privileges. A local attacker with low-level access could exploit these weaknesses to cause the script to execute arbitrary commands or modify privileged files, resulting in privilege escalation.
Weakness Types
External Control of File Name or Path
The software allows user input to control or influence paths or file names that are used in filesystem operations.
Execution with Unnecessary Privileges
The software performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Products Associated with CVE-2020-36868
stack.watch emails you whenever new vulnerabilities are published in Nagios Xi or Nagios Xi. Just hit a watch button to start following.
Affected Versions
Nagios XI:- Before 5.7.3 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.