CVE-2026-30893
Wazuh · Wazuh
A path traversal vulnerability in Wazuh's cluster synchronization routine allows authenticated peers to write arbitrary files and potentially achieve remote code execution.
Executive summary
An authenticated path traversal vulnerability in Wazuh allows cluster peers to perform arbitrary file writes, potentially leading to full system-level compromise.
Vulnerability
The cluster synchronization process improperly validates paths, allowing an authenticated peer to escape the intended directory and overwrite critical Python modules or system files.
Business impact
This vulnerability is rated at a 9.0 CVSS score because it allows an attacker who has compromised one node to escalate privileges and impact the entire cluster. This could result in a complete loss of security monitoring visibility and potential system-level control over the infrastructure.
Remediation
Immediate Action: Upgrade all Wazuh nodes to version 4.14.4 or later immediately.
Proactive Monitoring: Monitor cluster communication logs for unexpected file write operations or synchronization anomalies.
Compensating Controls: Isolate the cluster communication network and ensure that only authorized, trusted nodes can participate in the synchronization process.
Exploitation status
Public Exploit Available: Yes
Analyst recommendation
The availability of a proof-of-concept makes this a high-priority remediation task. Organizations must apply the provided patch to all Wazuh components to prevent cluster-wide compromise.