Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
References
History

Tue, 18 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 15:30:00 +0000

Type Values Removed Values Added
Description Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.
Title Insufficient permission validation when configuring notification parameters
First Time appeared Checkmk
Checkmk checkmk
Weaknesses CWE-280
CPEs cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
Vendors & Products Checkmk
Checkmk checkmk
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Checkmk

Published: 2025-11-18T15:11:17.244Z

Updated: 2025-11-18T21:33:35.695Z

Reserved: 2025-08-25T11:50:49.622Z

Link: CVE-2025-58122

cve-icon Vulnrichment

Updated: 2025-11-18T21:33:32.575Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-18T16:15:44.930

Modified: 2025-11-19T19:14:59.327

Link: CVE-2025-58122

cve-icon Redhat

No data.