Argument injection in special agent configuration in Checkmk <2.4.0p1, <2.3.0p32, <2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files
2025-05-21T09:15:35.520
2025-08-22T19:44:59.790
Analyzed
CVSSv3.1: 8.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | < 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |