CVE-2026-2042
Published: 20 February 2026
Description
Nagios Host monitoringwizard Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit this vulnerability. The specific flaw exists within the monitoringwizard module. The…
more
issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-28245.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of user-supplied inputs before use in system calls, addressing the core cause of the command injection vulnerability in the monitoringwizard module.
Mandates identification, reporting, and correction of the specific command injection flaw, ensuring timely patching as referenced in the Nagios changelog.
Enforces least privilege for the service account context, limiting the scope and impact of arbitrary code execution even if injection succeeds.
Security SummaryAI
CVE-2026-2042 is a command injection vulnerability resulting in remote code execution within the monitoringwizard module of Nagios Host. The issue stems from the lack of proper validation of user-supplied strings before they are used in system calls, affecting installations of Nagios Host. It is classified under CWE-78 (OS Command Injection) and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An authenticated remote attacker with low privileges can exploit this vulnerability over the network with low complexity and no user interaction required. By supplying a malicious string to the monitoringwizard module, the attacker can execute arbitrary code in the context of the service account running the Nagios Host service.
The Nagios changelog for Nagios XI 2026R1.0-1 at https://www.nagios.com/changelog/nagios-xi/nagios-xi-2026r1-0-1/ and the Zero Day Initiative advisory ZDI-26-071 at https://www.zerodayinitiative.com/advisories/ZDI-26-071/ provide further details on the vulnerability, including patch information and mitigation guidance. This issue was canonically reported as ZDI-CAN-28245.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection vulnerability in web-based Nagios module enables RCE via exploitation of public-facing application (T1190), remote service exploitation (T1210), privilege escalation from low-priv to service account (T1068), and Unix shell command execution (T1059.004).