CVE-2025-15026: CWE-306 Missing Authentication for Critical Function in Centreon Infra Monitoring
Missing Authentication for Critical Function vulnerability in Centreon Infra Monitoring centreon-awie (Awie import module) allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.3, from 24.04.0 before 24.04.3.
AI Analysis
Technical Summary
CVE-2025-15026 is a critical security vulnerability classified under CWE-306, indicating missing authentication for a critical function within the Centreon Infra Monitoring product, specifically in the centreon-awie (Awie import) module. This vulnerability affects versions 25.10.0 before 25.10.2, 24.10.0 before 24.10.3, and 24.04.0 before 24.04.3. The flaw allows unauthenticated attackers to invoke sensitive functions that should be protected by Access Control Lists (ACLs), effectively bypassing authentication mechanisms. The vulnerability is remotely exploitable over the network without any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is severe, with complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). Centreon Infra Monitoring is widely used for IT infrastructure monitoring, making this vulnerability particularly dangerous as it could allow attackers to manipulate monitoring data, disrupt alerting mechanisms, or gain further footholds within the network. Although no public exploits have been reported yet, the critical nature and ease of exploitation make it a high priority for remediation. The vulnerability was officially published on January 5, 2026, and was reserved on December 22, 2025. No official patches or mitigations were linked at the time of reporting, emphasizing the urgency for organizations to monitor vendor updates closely.
Potential Impact
For European organizations, the impact of CVE-2025-15026 is substantial. Centreon Infra Monitoring is commonly deployed in enterprise and government environments to oversee critical IT infrastructure. Exploitation could lead to unauthorized access to monitoring functions, allowing attackers to disable or manipulate alerts, hide malicious activity, or disrupt operational visibility. This can result in delayed incident response, increased risk of data breaches, and potential operational downtime. The full compromise of confidentiality, integrity, and availability could also facilitate lateral movement within networks, escalating the severity of attacks. Industries such as finance, healthcare, telecommunications, and public sector entities in Europe that rely heavily on Centreon for infrastructure monitoring are particularly vulnerable. The lack of authentication on critical functions increases the risk of automated attacks and exploitation by opportunistic threat actors. Given the criticality of infrastructure monitoring in maintaining service continuity and security, this vulnerability poses a direct threat to business operations and regulatory compliance across Europe.
Mitigation Recommendations
European organizations should immediately verify their Centreon Infra Monitoring versions and upgrade to the fixed versions 25.10.2, 24.10.3, or 24.04.3 as soon as they become available. Until patches are applied, organizations should restrict network access to the Centreon management interfaces, especially the Awie import module, using firewall rules or network segmentation to limit exposure to trusted administrative networks only. Implement strict access control policies and monitor logs for any unusual or unauthorized access attempts targeting the Centreon system. Employ intrusion detection and prevention systems (IDPS) to detect anomalous activities related to Centreon functions. Additionally, organizations should conduct thorough audits of their monitoring infrastructure to identify any signs of compromise or misuse. Establishing multi-factor authentication (MFA) for administrative access, if supported, can add an additional layer of protection. Finally, maintain close communication with Centreon for official patches and advisories and prepare incident response plans specific to monitoring infrastructure compromise scenarios.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2025-15026: CWE-306 Missing Authentication for Critical Function in Centreon Infra Monitoring
Description
Missing Authentication for Critical Function vulnerability in Centreon Infra Monitoring centreon-awie (Awie import module) allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.3, from 24.04.0 before 24.04.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-15026 is a critical security vulnerability classified under CWE-306, indicating missing authentication for a critical function within the Centreon Infra Monitoring product, specifically in the centreon-awie (Awie import) module. This vulnerability affects versions 25.10.0 before 25.10.2, 24.10.0 before 24.10.3, and 24.04.0 before 24.04.3. The flaw allows unauthenticated attackers to invoke sensitive functions that should be protected by Access Control Lists (ACLs), effectively bypassing authentication mechanisms. The vulnerability is remotely exploitable over the network without any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is severe, with complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). Centreon Infra Monitoring is widely used for IT infrastructure monitoring, making this vulnerability particularly dangerous as it could allow attackers to manipulate monitoring data, disrupt alerting mechanisms, or gain further footholds within the network. Although no public exploits have been reported yet, the critical nature and ease of exploitation make it a high priority for remediation. The vulnerability was officially published on January 5, 2026, and was reserved on December 22, 2025. No official patches or mitigations were linked at the time of reporting, emphasizing the urgency for organizations to monitor vendor updates closely.
Potential Impact
For European organizations, the impact of CVE-2025-15026 is substantial. Centreon Infra Monitoring is commonly deployed in enterprise and government environments to oversee critical IT infrastructure. Exploitation could lead to unauthorized access to monitoring functions, allowing attackers to disable or manipulate alerts, hide malicious activity, or disrupt operational visibility. This can result in delayed incident response, increased risk of data breaches, and potential operational downtime. The full compromise of confidentiality, integrity, and availability could also facilitate lateral movement within networks, escalating the severity of attacks. Industries such as finance, healthcare, telecommunications, and public sector entities in Europe that rely heavily on Centreon for infrastructure monitoring are particularly vulnerable. The lack of authentication on critical functions increases the risk of automated attacks and exploitation by opportunistic threat actors. Given the criticality of infrastructure monitoring in maintaining service continuity and security, this vulnerability poses a direct threat to business operations and regulatory compliance across Europe.
Mitigation Recommendations
European organizations should immediately verify their Centreon Infra Monitoring versions and upgrade to the fixed versions 25.10.2, 24.10.3, or 24.04.3 as soon as they become available. Until patches are applied, organizations should restrict network access to the Centreon management interfaces, especially the Awie import module, using firewall rules or network segmentation to limit exposure to trusted administrative networks only. Implement strict access control policies and monitor logs for any unusual or unauthorized access attempts targeting the Centreon system. Employ intrusion detection and prevention systems (IDPS) to detect anomalous activities related to Centreon functions. Additionally, organizations should conduct thorough audits of their monitoring infrastructure to identify any signs of compromise or misuse. Establishing multi-factor authentication (MFA) for administrative access, if supported, can add an additional layer of protection. Finally, maintain close communication with Centreon for official patches and advisories and prepare incident response plans specific to monitoring infrastructure compromise scenarios.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-12-22T09:36:24.995Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695bcf2a3dc84013b27be7ad
Added to database: 1/5/2026, 2:48:10 PM
Last enriched: 1/5/2026, 3:02:47 PM
Last updated: 1/7/2026, 8:39:02 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.