Nagios XI versions prior to 2024R1.4.2 contain a remote code execution vulnerability in the Business Process Intelligence (BPI) component. Insufficient validation and sanitization of administrator-controlled BPI configuration parameters (notably bpi_logfile and bpi_configfile) allow an authenticated administrative user to cause the product to create or overwrite files within the webroot and subsequently edit them via the BPI configuration editor. When such files carry executable extensions and are served by the web application, arbitrary code may be executed in the context of the web application user. Successful exploitation results in arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to gain further control of the underlying host operating system.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios nagios Xi
|
|
| CPEs | cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.0.1:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.0.2:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.1.1:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.1.2:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.1.3:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.1.4:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.1.5:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.1:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.2.1:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.2.2:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.2:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.3.1:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.3.2:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.3.3:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.3.4:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.3:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.4.1:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1.4:*:*:*:*:*:* cpe:2.3:a:nagios:nagios_xi:2024:r1:*:*:*:*:*:* |
|
| Vendors & Products |
Nagios nagios Xi
|
|
| Metrics |
cvssV3_1
|
Fri, 31 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios xi |
|
| Vendors & Products |
Nagios
Nagios xi |
Thu, 30 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios XI versions prior to 2024R1.4.2 contain a remote code execution vulnerability in the Business Process Intelligence (BPI) component. Insufficient validation and sanitization of administrator-controlled BPI configuration parameters (notably bpi_logfile and bpi_configfile) allow an authenticated administrative user to cause the product to create or overwrite files within the webroot and subsequently edit them via the BPI configuration editor. When such files carry executable extensions and are served by the web application, arbitrary code may be executed in the context of the web application user. Successful exploitation results in arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to gain further control of the underlying host operating system. | |
| Title | Nagios XI < 2024R1.4.2 RCE via Business Process Intelligence (BPI) | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-10-30T21:41:58.188Z
Updated: 2025-10-31T13:24:24.573Z
Reserved: 2025-04-15T19:15:22.562Z
Link: CVE-2025-34134
Updated: 2025-10-31T13:05:43.422Z
Status : Analyzed
Published: 2025-10-30T22:15:46.983
Modified: 2025-11-06T18:17:25.503
Link: CVE-2025-34134
No data.