CVE-2025-15616 in Wazuhinfo

Summary

Wazuh wazuh-agent and wazuh-manager versions 2.1.0 before 4.8.0 contain multiple shell injection and untrusted search path vulnerabilities that allow attackers to execute arbitrary commands through various components including logcollector configuration, maild SMTP server tags, and Kaspersky AR script parameters. Attackers can exploit these vulnerabilities by injecting malicious commands through configuration files, SMTP server settings, and custom flags to achieve remote code execution on affected systems.

Responsible

VulnCheck

Reservation

03/27/2026

Disclosure

03/27/2026

Entries

VulDB provides additional information and datapoints for this CVE:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!