Summarize with:

Share
CVE-2026-25769 is a critical Wazuh vulnerability that turns trusted cluster communication into a path for remote command execution on the master node. Research from Hakai Security shows that a compromised worker can abuse insecure deserialization in the cluster protocol to execute arbitrary commands on the master, giving attackers a dangerous way to compromise the very platform many organizations rely on for centralized security visibility.
The issue affects Wazuh versions up to 4.14.1. According to the published technical analysis, exploitation requires access to a worker node, which already provides the cluster key and network position needed to reach the master over the internal cluster channel. Once that trust boundary is broken, the attacker can pivot into the center of the monitoring stack.
This is not just another isolated vulnerability in an internal service. Wazuh often sits close to the heart of the security program, collecting logs, coordinating agents, and supporting detection operations across distributed environments. If an attacker can execute commands on the master node, they can tamper with centralized telemetry, weaken monitoring, and potentially use the platform to support further lateral movement.
That risk becomes more serious in environments where cluster trust is treated as implicit and internal services are not protected with strong network segmentation. In those cases, compromise of a single worker may become enough to endanger the whole Wazuh deployment.
At the center of the issue is Wazuh’s as_wazuh_object() function, used as an object_hook during json.loads() when cluster messages are processed. Hakai Security found that this logic accepts user-controlled fields such as __module__, imports arbitrary Python modules, resolves callables dynamically, and returns functions that are later executed without any meaningful allowlist.
In simple terms, the deserialization flow treats attacker-influenced data as if it were trusted instructions.
subprocess.getoutput inside the JSON payload.The core problem is not a broken crypto boundary. It is the assumption that authenticated cluster messages are safe to deserialize into executable Python objects.
Example payload structure highlighted by the research:
json{ "f": { "__callable__": { "__name__": "getoutput", "__module__": "subprocess", "__qualname__": "getoutput" } }, "f_kwargs": { "cmd": "id > /tmp/RCE_PROOF && date >> /tmp/RCE_PROOF" }, "request_type": "local_master" }
According to the researchers, successful exploitation can lead to command execution on the master with Wazuh process privileges, creating a serious platform compromise risk even if the initial foothold begins on a worker.
| Date | Event | Status |
|---|---|---|
| 2026-03-18 | Hakai Security publishes technical research and proof-of-concept details for CVE-2026-25769 | 📢 Public disclosure |
| 2026-03-18 | GitHub advisory GHSA-3gm7-962f-fxw5 is referenced as the coordinated disclosure path | 📢 Advisory available |
| Ongoing | Organizations assess whether exposed or compromised worker nodes can reach Wazuh masters over the cluster channel | 🔍 Continuing threat |
A compromised master node can become more than a single-server event. The master typically has broad visibility into agents, policies, event flows, and operational security data. In practical terms, attackers who gain command execution there may be able to blind defenders, tamper with evidence, change configurations, or use the monitoring plane to expand their reach.
That makes this issue especially sensitive for teams that depend on Wazuh as part of their incident response and detection workflow. When a monitoring platform is compromised, the reliability of the signals defenders use to make decisions may be damaged at the exact moment accuracy matters most.
Illustrative hunt query for suspicious process execution on a Linux-based Wazuh master:
bashgrep -R "subprocess\|getoutput\|local_master\|dapi" /var/ossec/logs /var/ossec/framework 2>/dev/null
CVE-2026-25769 shows how quickly internal trust can become an attack path when deserialization logic is allowed to resolve and execute attacker-controlled callables. If an adversary reaches a Wazuh worker node, this flaw can turn that foothold into command execution on the master and put the security monitoring plane itself at risk.
For defenders, the right response is to treat Wazuh cluster trust as a high-value control surface: review worker exposure, patch quickly, validate master integrity, and assume that compromise of a trusted internal node can have wider consequences than traditional perimeter-focused models suggest.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
vulnerabilityCVE-2026-32746: Telnetd flaw enables unauthenticated root RCE CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd that can allow an unauthenticated remot...
vulnerabilityMicrosoft March 2026 Patch Tuesday Fixes 2 Public Zero-Days and Copilot-Linked Excel Risk | 2026 Executive Summary Microsoft's March 2026 Patch Tuesday is not j...
vulnerabilityCisco SD-WAN Flaws CVE-2026-20122 and CVE-2026-20128 Face Active Exploitation | 2026 Executive Summary CVE-2026-20122 and CVE-2026-20128 have turned Cisco's SD-...