CVE-2025-34288 – Nagios XI – Local Privilege Escalation via Writable PHP Include

CVSS 6.7 MODERATE

“A writable application file combined with a trusted sudo path created a direct route to root.”

A security update addresses CVE-2025-34288 in Nagios XI, a local privilege escalation vulnerability affecting the monitoring platform’s application environment. The issue occurs when a maintenance script that runs with elevated privileges loads a PHP include file that is writable by a lower-privileged application user. An attacker with access to the Nagios XI application account can modify that file and inject malicious code that executes when the privileged script runs.

Successful exploitation allows the attacker to execute commands with elevated permissions, potentially leading to full system compromise of the monitoring server. The CVSS score is 8.6, which is High severity.

The vendor released a security update that resolves the issue by correcting file ownership and permission handling so that lower-privileged users can no longer modify the included file used by the privileged maintenance process.

Key Details

Affected Product
Nagios Nagios Xi
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
CWE Classification
CWE-732
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.