Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13986: CWE-434 Unrestricted Upload of File with Dangerous Type in Nagios Nagios XI

0
High
VulnerabilityCVE-2024-13986cvecve-2024-13986cwe-434cwe-22
Published: Thu Aug 28 2025 (08/28/2025, 15:49:46 UTC)
Source: CVE Database V5
Vendor/Project: Nagios
Product: Nagios XI

Description

Nagios XI < 2024R1.3.2 contains a remote code execution vulnerability by chaining two flaws: an arbitrary file upload and a path traversal in the Core Config Snapshots interface. The issue arises from insufficient validation of file paths and extensions during MIB upload and snapshot rename operations. Exploitation results in the placement of attacker-controlled PHP files in a web-accessible directory, executed as the www-data user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:01:54 UTC

Technical Analysis

CVE-2024-13986 is a remote code execution vulnerability in Nagios XI prior to version 2024R1.3.2, caused by a combination of two security flaws: an arbitrary file upload vulnerability (CWE-434) and a path traversal vulnerability (CWE-22) within the Core Config Snapshots interface. The vulnerability occurs due to improper validation of file paths and extensions during Management Information Base (MIB) file uploads and snapshot rename operations. Attackers can exploit these flaws to upload malicious PHP files to directories accessible via the web server. Because the uploaded files are executed by the web server as the www-data user, attackers gain the ability to execute arbitrary code remotely without authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality, integrity, and availability. The lack of authentication requirements and ease of exploitation make this a critical threat for organizations using Nagios XI for monitoring and management of IT infrastructure. No public exploit code or active exploitation has been reported yet, but the vulnerability's nature makes it a prime target for attackers seeking to gain persistent access or disrupt monitoring services.

Potential Impact

The exploitation of CVE-2024-13986 can lead to full remote code execution on affected Nagios XI servers, allowing attackers to execute arbitrary commands with the privileges of the web server user (www-data). This can result in unauthorized access to sensitive monitoring data, manipulation or disruption of monitoring services, lateral movement within the network, and potential deployment of further malware or ransomware. Given Nagios XI's role in critical infrastructure monitoring, successful exploitation could impair an organization's ability to detect and respond to other security incidents, amplifying the overall risk. The vulnerability affects all versions prior to 2024R1.3.2, potentially impacting a wide range of organizations globally that rely on Nagios XI. The absence of required authentication and user interaction increases the likelihood of automated exploitation attempts once public exploit code becomes available.

Mitigation Recommendations

Organizations should immediately upgrade Nagios XI to version 2024R1.3.2 or later, where this vulnerability is addressed. If immediate patching is not feasible, restrict network access to the Core Config Snapshots interface to trusted administrators only, ideally via VPN or IP whitelisting. Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts and path traversal patterns targeting the MIB upload and snapshot rename functionalities. Regularly audit web-accessible directories for unauthorized PHP or other executable files. Monitor server logs for unusual file uploads or execution patterns indicative of exploitation attempts. Employ intrusion detection systems (IDS) to alert on anomalous web server behavior. Additionally, enforce the principle of least privilege on the web server user to limit the potential impact of code execution. Conduct thorough incident response readiness to quickly contain and remediate any compromise stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-08-28T15:35:33.691Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a323af0ba78a05059954b

Added to database: 11/4/2025, 5:04:58 PM

Last enriched: 2/26/2026, 10:01:54 PM

Last updated: 3/23/2026, 2:57:04 PM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses