Wazuh is a free and open source platform used for threat prevention, detection, and response. In versions starting from 3.8.0 to before 4.11.0, wazuh-analysisd is vulnerable to a heap buffer overflow when parsing XML elements from Windows EventChannel messages. This issue has been patched in version 4.11.0.
References
| Link | Resource |
|---|---|
| https://github.com/wazuh/wazuh/security/advisories/GHSA-vw3r-mjg3-9hh2 | Exploit Vendor Advisory |
Configurations
History
16 Oct 2025, 17:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wazuh
Wazuh wazuh |
|
| References | () https://github.com/wazuh/wazuh/security/advisories/GHSA-vw3r-mjg3-9hh2 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:* |
27 Sep 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-27 01:15
Updated : 2025-10-16 17:33
NVD link : CVE-2025-59938
Mitre link : CVE-2025-59938
CVE.ORG link : CVE-2025-59938
JSON object : View
Products Affected
wazuh
- wazuh
CWE
CWE-122
Heap-based Buffer Overflow
