{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-39666","assignerOrgId":"f7d6281c-4801-44ce-ace2-493291dedb0f","state":"PUBLISHED","assignerShortName":"Checkmk","dateReserved":"2025-04-16T07:07:38.257Z","datePublished":"2026-04-07T12:09:07.609Z","dateUpdated":"2026-04-07T13:18:19.609Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Checkmk","vendor":"Checkmk GmbH","versions":[{"status":"affected","version":"2.2.0","versionType":"semver"},{"lessThan":"2.3.0p46","status":"affected","version":"2.3.0","versionType":"semver"},{"lessThan":"2.4.0p25","status":"affected","version":"2.4.0","versionType":"semver"},{"lessThan":"2.5.0b3","status":"affected","version":"2.5.0b1","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"Local privilege escalation in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows a site user to escalate their privileges to root, by manipulating files in the site context that are processed when the `omd` administrative command is run by root."}],"impacts":[{"capecId":"CAPEC-471","descriptions":[{"lang":"en","value":"CAPEC-471: Search Order Hijacking"}]},{"capecId":"CAPEC-17","descriptions":[{"lang":"en","value":"CAPEC-17: Accessing, Modifying or Executing Executable Files"}]}],"metrics":[{"cvssV4_0":{"baseScore":9.3,"baseSeverity":"CRITICAL","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-426","description":"CWE-426: Untrusted Search Path","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-829","description":"CWE-829: Inclusion of Functionality from Untrusted Control Sphere","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f7d6281c-4801-44ce-ace2-493291dedb0f","shortName":"Checkmk","dateUpdated":"2026-04-07T12:09:07.609Z"},"references":[{"url":"https://checkmk.com/werk/18891","tags":["vendor-advisory"]}],"title":"omd: Local privilege escalation when executing omd commands as root","cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*","versionStartIncluding":"2.3.0","versionEndExcluding":"2.3.0p46"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*","versionStartIncluding":"2.4.0","versionEndExcluding":"2.4.0p25"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*","versionStartIncluding":"2.5.0b1","versionEndExcluding":"2.5.0b3"}]}]}],"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-07T13:18:12.687066Z","id":"CVE-2025-39666","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-07T13:18:19.609Z"}}]}}