Checkmk

Checkmk

92 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS -
  • Veröffentlicht 04.03.2026 13:15:41
  • Zuletzt bearbeitet 04.03.2026 14:16:14

A logic error in the remove_password() function in Checkmk GmbH's Checkmk versions <2.4.0p23, <2.3.0p43, and 2.2.0 (EOL) allows a low-privileged user to cause data loss.

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 26.02.2026 10:26:00
  • Zuletzt bearbeitet 02.03.2026 13:27:15

Improper neutralization of input in Checkmk versions 2.4.0 before 2.4.0p22, and 2.3.0 before 2.3.0p43 allows an attacker that can manipulate a host's check output to inject malicious JavaScript into the Synthetic Monitoring HTML logs, which can then ...

  • EPSS 0.04%
  • Veröffentlicht 09.02.2026 15:29:16
  • Zuletzt bearbeitet 09.02.2026 21:55:30

Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p21, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows users with the "Use WATO" permission to access the "Analyze configuration" page by directly navigating to its URL, bypassing the ...

  • EPSS 0.04%
  • Veröffentlicht 18.12.2025 14:15:59
  • Zuletzt bearbeitet 23.12.2025 17:04:50

SSH private keys of the "Remote alert handlers (Linux)" rule were exposed in the rule page's HTML source in Checkmk <= 2.4.0p18 and all versions of Checkmk 2.3.0. This potentially allowed unauthorized triggering of predefined alert handlers on hosts ...

  • EPSS 0.04%
  • Veröffentlicht 18.12.2025 09:11:17
  • Zuletzt bearbeitet 23.12.2025 17:03:40

Insufficient permission validation in Checkmk versions prior to 2.4.0p17 and 2.3.0p42 allow low-privileged users to view agent information via the REST API, which could lead to information disclosure.

  • EPSS 0.04%
  • Veröffentlicht 18.11.2025 15:11:35
  • Zuletzt bearbeitet 24.11.2025 14:27:29

Insufficient permission validation on multiple REST API endpoints in Checkmk 2.2.0, 2.3.0, and 2.4.0 before version 2.4.0p16 allows low-privileged users to perform unauthorized actions or obtain sensitive information

  • EPSS 0.04%
  • Veröffentlicht 18.11.2025 15:11:17
  • Zuletzt bearbeitet 24.11.2025 13:58:28

Insufficient permission validation in Checkmk 2.4.0 before version 2.4.0p16 allows low-privileged users to modify notification parameters via the REST API, which could lead to unauthorized actions or information disclosure.

  • EPSS 0.02%
  • Veröffentlicht 18.11.2025 15:10:53
  • Zuletzt bearbeitet 24.11.2025 14:13:26

In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially le...

Medienbericht Exploit
  • EPSS 0.09%
  • Veröffentlicht 30.10.2025 10:43:08
  • Zuletzt bearbeitet 03.12.2025 20:06:16

Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).

Medienbericht Exploit
  • EPSS 0.11%
  • Veröffentlicht 09.10.2025 15:01:55
  • Zuletzt bearbeitet 04.12.2025 20:37:25

Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.