CVE-2025-64999
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious JavaScript into the monitoring logs of Checkmk, which can then be accessed through a specially crafted phishing link. To exploit this, the attacker needs to manipulate the output from a monitored host, making it essential for them to have some level of access to the system.
Technical Description
Improper neutralization of input in Checkmk versions 2.4.0 before 2.4.0p22, and 2.3.0 before 2.3.0p43 allows an attacker that can manipulate a host's check output to inject malicious JavaScript into the Synthetic Monitoring HTML logs, which can then be accessed via a crafted phishing link.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 26, 2026
about 1 month ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
checkmk
Product
checkmk
Related Vulnerabilities
This vulnerability allows an attacker who is already logged into Checkmk to find out details about existing hosts by looking at different responses from the system. It occurs because the system doesn't properly check permissions, making it easier for these users to access sensitive information.
A low-privileged user can exploit a flaw in Checkmk to unintentionally delete important data. This issue affects specific older versions of the software, so users running those versions should update to avoid potential data loss.