Nagios XI Local Privilege Escalation in Maintenance Script (before 2026R1.1)
CVE-2025-34288 Published on December 16, 2025

Nagios XI Privilege Escalation via Writable PHP Include Executed with Sudo
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A useraccessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lowerprivileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

NVD

Weakness Type

Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. When a resource is given a permissions setting that provides access to a wider range of actors than required, it could lead to the exposure of sensitive information, or the modification of that resource by unintended parties. This is especially dangerous when the resource is related to program configuration, execution or sensitive user data.


Products Associated with CVE-2025-34288

Want to know whenever a new CVE is published for Nagios Xi? stack.watch will email you.

 

Affected Versions

Nagios Enterprises Nagios XI:

Exploit Probability

EPSS
0.15%
Percentile
35.22%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.