Nagios XI versions prior to 2024R1.4.2 contain a remote code execution vulnerability in the Business Process Intelligence (BPI) component. Insufficient validation and sanitization of administrator-controlled BPI configuration parameters (notably bpi_logfile and bpi_configfile) allow an authenticated administrative user to cause the product to create or overwrite files within the webroot and subsequently edit them via the BPI configuration editor. When such files carry executable extensions and are served by the web application, arbitrary code may be executed in the context of the web application user. Successful exploitation results in arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to gain further control of the underlying host operating system.
History

Thu, 06 Nov 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Nagios nagios Xi
CPEs cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.0.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.0.2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.3:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.4:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.5:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.2.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.2.2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.3.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.3.2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.3.3:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.3.4:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.3:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.4.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.4:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1:*:*:*:*:*:*
Vendors & Products Nagios nagios Xi
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Fri, 31 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Nagios
Nagios xi
Vendors & Products Nagios
Nagios xi

Thu, 30 Oct 2025 21:45:00 +0000

Type Values Removed Values Added
Description Nagios XI versions prior to 2024R1.4.2 contain a remote code execution vulnerability in the Business Process Intelligence (BPI) component. Insufficient validation and sanitization of administrator-controlled BPI configuration parameters (notably bpi_logfile and bpi_configfile) allow an authenticated administrative user to cause the product to create or overwrite files within the webroot and subsequently edit them via the BPI configuration editor. When such files carry executable extensions and are served by the web application, arbitrary code may be executed in the context of the web application user. Successful exploitation results in arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to gain further control of the underlying host operating system.
Title Nagios XI < 2024R1.4.2 RCE via Business Process Intelligence (BPI)
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-10-30T21:41:58.188Z

Updated: 2025-10-31T13:24:24.573Z

Reserved: 2025-04-15T19:15:22.562Z

Link: CVE-2025-34134

cve-icon Vulnrichment

Updated: 2025-10-31T13:05:43.422Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-30T22:15:46.983

Modified: 2025-11-06T18:17:25.503

Link: CVE-2025-34134

cve-icon Redhat

No data.