Cyber Posture

CVE-2018-25122

HighPublic PoCRCE

Published: 30 October 2025

Published
30 October 2025
Modified
05 November 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0138 80.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2018-25122 is a high-severity OS Command Injection (CWE-78) vulnerability in Nagios Nagios Xi. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 19.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the lack of input validation on attacker-controlled inputs in the Component Download handler, preventing OS command injection.

prevent

Mitigates the insufficient output encoding in unsafe command construction by filtering outputs before execution.

prevent

Remediates the specific command injection flaw by applying vendor patches or upgrading to Nagios XI 5.4.13 or later.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

RCE via OS command injection (T1059.004) in a network-accessible web application (T1190), enabling privilege escalation from low-privilege authenticated access (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Nagios XI versions prior to 5.4.13 contain a remote code execution vulnerability in the Component Download page. The download/import handler used unsafe command construction with attacker-controlled input and lacked sufficient validation and output encoding, allowing an authenticated user to inject…

more

commands or otherwise execute arbitrary code with the privileges of the application service.

Deeper analysisAI

CVE-2018-25122 is a remote code execution vulnerability affecting Nagios XI versions prior to 5.4.13, specifically in the Component Download page. The issue stems from unsafe command construction in the download/import handler, which processes attacker-controlled input without sufficient validation or output encoding. This flaw, classified under CWE-78 (OS Command Injection), enables command injection and arbitrary code execution with the privileges of the Nagios XI application service. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.

An authenticated user with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting malicious input during component download or import operations, the attacker can inject operating system commands, leading to arbitrary code execution on the server hosting Nagios XI. Successful exploitation grants the attacker the same privileges as the application service, potentially allowing full control over the monitoring system and any connected infrastructure.

Mitigation involves upgrading to Nagios XI version 5.4.13 or later, as detailed in the official Nagios changelog at https://www.nagios.com/changelog/nagios-xi/. Additional guidance on the vulnerability and remediation is available in the VulnCheck advisory at https://www.vulncheck.com/advisories/nagios-xi-component-download-page-rce.

Details

CWE(s)

Affected Products

nagios
nagios xi
≤ 5.4.13

CVEs Like This One

CVE-2013-10073Same product: Nagios Nagios Xi
CVE-2026-2042Same product: Nagios Nagios Xi
CVE-2025-34284Same product: Nagios Nagios Xi
CVE-2024-14003Same product: Nagios Nagios Xi
CVE-2026-2043Same product: Nagios Nagios Xi
CVE-2020-36867Same product: Nagios Nagios Xi
CVE-2026-2041Same product: Nagios Nagios Xi
CVE-2024-14005Same product: Nagios Nagios Xi
CVE-2025-34227Same product: Nagios Nagios Xi
CVE-2020-36856Same product: Nagios Nagios Xi

References