Nagios Log Server 2026R1.0.1 Authenticated Command Injection via NL Queries
CVE-2025-34322 Published on November 17, 2025

Nagios Log Server < 2026R1.0.1 Authenticated Command Injection via Natural Language Queries
Nagios Log Server versions prior to 2026R1.0.1 contain an authenticated command injection vulnerability in the experimental 'Natural Language Queries' feature. When this feature is configured, certain user-controlled settingsincluding model selection and connection parametersare read from the global configuration and concatenated into a shell command that is executed via shell_exec() without proper input handling or command-line argument sanitation. An authenticated user with access to the 'Global Settings' page can supply crafted values in these fields to inject additional shell commands, resulting in arbitrary command execution as the 'www-data' user and compromise of the Log Server host.

Vendor Advisory NVD

Timeline

2026R1.0.1 is released

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2025-34322 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2025-34322

Want to know whenever a new CVE is published for Nagios Log Server? stack.watch will email you.

 

Affected Versions

Nagios Log Server:

Exploit Probability

EPSS
0.39%
Percentile
59.48%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.