Nagios Log Server versions prior to 2026R1.0.1 contain an authenticated command injection vulnerability in the experimental 'Natural Language Queries' feature. When this feature is configured, certain user-controlled settings—including model selection and connection parameters—are read from the global configuration and concatenated into a shell command that is executed via shell_exec() without proper input handling or command-line argument sanitation. An authenticated user with access to the 'Global Settings' page can supply crafted values in these fields to inject additional shell commands, resulting in arbitrary command execution as the 'www-data' user and compromise of the Log Server host.
History

Wed, 26 Nov 2025 14:30:00 +0000

Type Values Removed Values Added
References

Mon, 24 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
Description Nagios Log Server versions prior to 2026R1.0.1 contain an authenticated command injection vulnerability via the experimental 'Natural Language Queries' feature. Configuration values for this feature are read from the application settings and incorporated into a system command without adequate validation or restriction of special characters. An authenticated user with access to global configuration can abuse these settings to execute arbitrary operating system commands with the privileges of the web server account, leading to compromise of the Log Server host. Nagios Log Server versions prior to 2026R1.0.1 contain an authenticated command injection vulnerability in the experimental 'Natural Language Queries' feature. When this feature is configured, certain user-controlled settings—including model selection and connection parameters—are read from the global configuration and concatenated into a shell command that is executed via shell_exec() without proper input handling or command-line argument sanitation. An authenticated user with access to the 'Global Settings' page can supply crafted values in these fields to inject additional shell commands, resulting in arbitrary command execution as the 'www-data' user and compromise of the Log Server host.

Thu, 20 Nov 2025 22:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nagios:log_server:*:*:*:*:*:*:*:*
cpe:2.3:a:nagios:log_server:2026:r1:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Wed, 19 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 17 Nov 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Nagios
Nagios log Server
CPEs cpe:2.3:a:nagios:log_server:2026:*:*:*:*:*:*:*
Vendors & Products Nagios
Nagios log Server

Mon, 17 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
Description Nagios Log Server versions prior to 2026R1.0.1 contain an authenticated command injection vulnerability via the experimental 'Natural Language Queries' feature. Configuration values for this feature are read from the application settings and incorporated into a system command without adequate validation or restriction of special characters. An authenticated user with access to global configuration can abuse these settings to execute arbitrary operating system commands with the privileges of the web server account, leading to compromise of the Log Server host.
Title Nagios Log Server < 2026R1.0.1 Authenticated Command Injection via Natural Language Queries
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-11-17T17:48:04.503Z

Updated: 2025-11-26T14:14:45.447Z

Reserved: 2025-04-15T19:15:22.585Z

Link: CVE-2025-34322

cve-icon Vulnrichment

Updated: 2025-11-17T18:04:32.253Z

cve-icon NVD

Status : Modified

Published: 2025-11-17T18:15:56.710

Modified: 2025-11-26T15:15:51.983

Link: CVE-2025-34322

cve-icon Redhat

No data.