Nagios XI versions prior to 2024R1.2 contain a command injection vulnerability in the Docker Wizard. Insufficient validation of user-supplied input in the wizard allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user.
PUBLISHED5.2CWE-78
Nagios XI < 2024R1.2 Command Injection via Docker Wizard
Problem type
Affected products
Nagios
XI
< 2024R1.2 - UNKNOWN
References
nagios.com
https://www.nagios.com/products/security/#nagios-xi
nagios.com
https://www.nagios.com/changelog/nagios-xi/
vulncheck.com
https://www.vulncheck.com/advisories/nagios-xi-command-injection-via-docker-wizard
JSON source
Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2024-14005",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2025-10-31T13:25:31.802Z",
"dateReserved": "2025-10-22T18:51:23.211Z",
"datePublished": "2025-10-30T21:37:28.667Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2025-10-30T21:37:28.667Z"
},
"title": "Nagios XI < 2024R1.2 Command Injection via Docker Wizard",
"descriptions": [
{
"lang": "en",
"value": "Nagios XI versions prior to 2024R1.2 contain a command injection vulnerability in the Docker Wizard. Insufficient validation of user-supplied input in the wizard allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Nagios XI versions prior to 2024R1.2 contain a command injection vulnerability in the Docker Wizard. Insufficient validation of user-supplied input in the wizard allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user.<br>"
}
]
}
],
"affected": [
{
"vendor": "Nagios",
"product": "XI",
"modules": [
"Docker Wizard (Nagios XI web UI module)"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "unknown",
"versionType": "custom",
"lessThan": "2024R1.2"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
"cweId": "CWE-78",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.nagios.com/products/security/#nagios-xi",
"tags": [
"vendor-advisory",
"patch"
]
},
{
"url": "https://www.nagios.com/changelog/nagios-xi/",
"tags": [
"release-notes",
"patch"
]
},
{
"url": "https://www.vulncheck.com/advisories/nagios-xi-command-injection-via-docker-wizard",
"tags": [
"third-party-advisory"
]
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"workarounds": [
{
"lang": "en",
"value": "Remove the Docker Wizard.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Remove the Docker Wizard.<br>"
}
]
}
],
"solutions": [
{
"lang": "en",
"value": "Nagios addresses this vulnerability as \"Nagios XI was vulnerable to command injection via the Docker Wizard\" and as a part of \"Improved validation in Docker Wizard and mitigated NULL poisoning vulnerability on systems with older PHP distributions.\"",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<span style=\"background-color: rgb(255, 255, 255);\">Nagios addresses this vulnerability as \"</span><span style=\"background-color: rgb(255, 255, 255);\">Nagios XI was vulnerable to command injection via the Docker Wizard\" and as a part of \"Improved validation in Docker Wizard and mitigated NULL poisoning vulnerability on systems with older PHP distributions.\"</span><br>"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Exodus Intelligence",
"type": "finder"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-10-31T13:25:31.802Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}