Cyber Posture

CVE-2020-36859

HighPublic PoC

Published: 30 October 2025

Published
30 October 2025
Modified
06 November 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0111 78.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may leverage databases to mine valuable information.

Security Summary

CVE-2020-36859 is a set of multiple SQL injection vulnerabilities (CWE-89) affecting the Core Config Manager (CCM) component in Nagios XI versions prior to CCM 3.0.7 and Nagios XI 5.7.4. The flaws reside in the object edit pages, where unsanitized user-supplied input is directly incorporated into SQL queries executed by configuration object editors. This allows attackers to inject malicious SQL fragments. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact across confidentiality, integrity, and availability.

Authenticated users with low privileges can exploit these vulnerabilities remotely over the network with low complexity and no user interaction required. Successful exploitation enables unauthorized disclosure or modification of configuration and application data stored in the database. In certain environments, this could escalate to broader compromise of the Nagios XI application or the underlying backend database.

Mitigation involves upgrading to CCM 3.0.7 or Nagios XI 5.7.4 or later, as indicated by the affected version boundaries. Additional details on patches and remediation are available in the Nagios XI changelog at https://www.nagios.com/changelog/nagios-xi/ and the Vulncheck advisory at https://www.vulncheck.com/advisories/nagios-xi-ccm-sqli-via-object-edit-pages.

Details

CWE(s)
CWE-89

Affected Products

nagios
nagios xi
≤ 5.7.4

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection enables exploitation for privilege escalation (T1068) from low privileges to broader compromise and data collection/modification from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References