Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.
References
| Link | Resource |
|---|---|
| https://checkmk.com/werk/17984 | Vendor Advisory |
| https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal | Exploit Third Party Advisory |
| http://seclists.org/fulldisclosure/2025/Oct/7 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-09 15:16
Updated : 2025-12-04 20:37
NVD link : CVE-2025-39664
Mitre link : CVE-2025-39664
CVE.ORG link : CVE-2025-39664
JSON object : View
Products Affected
checkmk
- checkmk
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
