Cyber Posture

CVE-2025-44823

CriticalPublic PoC

Published: 07 October 2025

Published
07 October 2025
Modified
06 November 2025
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0083 74.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-44823 is a critical-severity Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) vulnerability in Nagios Log Server. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Credential Access (T1212); ranked in the top 25.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Credential Access (T1212) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations to restrict low-privilege authenticated users from accessing sensitive administrative API keys via the vulnerable endpoint.

prevent

Requires identification, reporting, and correction of flaws like this improper access control vulnerability through timely patching to Nagios Log Server 2024R1.3.2 or later.

prevent

Implements least privilege to ensure authenticated users only access resources necessary for their roles, mitigating exposure of administrative API keys.

MITRE ATT&CK Enterprise TechniquesAI

T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The vulnerability allows low-privileged authenticated users to exploit an API endpoint for credential access (T1212), enabling privilege escalation (T1068) and exploitation of a remote service (T1210).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Nagios Log Server before 2024R1.3.2 allows authenticated users to retrieve cleartext administrative API keys via a /nagioslogserver/index.php/api/system/get_users call. This is GL:NLS#475.

Deeper analysisAI

CVE-2025-44823 is a critical vulnerability in Nagios Log Server versions prior to 2024R1.3.2, stemming from improper restriction of knowledge to authenticated users (CWE-497). It allows any authenticated user to retrieve cleartext administrative API keys through an unauthenticated API endpoint at /nagioslogserver/index.php/api/system/get_users. The issue, tracked internally as GL:NLS#475, carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), highlighting its severe potential impact across confidentiality, integrity, and availability with a changed scope.

An attacker with low-privilege authenticated access, such as a standard user account, can exploit this remotely over the network with minimal complexity and no user interaction required. Successful exploitation exposes sensitive administrative API keys in plaintext, enabling privilege escalation to full administrative control. This could allow attackers to manipulate server configurations, access logs, execute arbitrary actions via the API, or pivot to further compromise the environment.

Advisories reference a proof-of-concept exploit available on Exploit-DB (ID 52177) and point to the Nagios changelog for patch details. Mitigation involves upgrading to Nagios Log Server 2024R1.3.2 or later, which addresses the flaw by restricting access to administrative data in the affected API call.

Public availability of an Exploit-DB entry indicates active interest from the security research community, though no widespread real-world exploitation has been reported as of the CVE publication on 2025-10-07.

Details

CWE(s)

Affected Products

nagios
log server
2024 · ≤ 2024

CVEs Like This One

CVE-2025-34274Same product: Nagios Log Server
CVE-2025-34271Same product: Nagios Log Server
CVE-2025-34277Same product: Nagios Log Server
CVE-2025-44824Same product: Nagios Log Server
CVE-2023-7322Same product: Nagios Log Server
CVE-2024-13999Same product class: network monitoring / SIEM
CVE-2024-13995Same product class: network monitoring / SIEM
CVE-2026-2042Same product class: network monitoring / SIEM
CVE-2025-67255Same product class: network monitoring / SIEM
CVE-2025-60425Same product class: network monitoring / SIEM

References