Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.12.0, a buffer over-read occurs in w_expression_match() when strlen() is called on str_test, because the corresponding buffer is not being properly NULL terminated during its allocation in OS_CleanMSG(). A compromised agent can cause a READ operation beyond the end of the allocated buffer (which may contain sensitive information) by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause a buffer over-read and potentially access sensitive data. This vulnerability is fixed in 4.12.0.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:* | |
| Metrics | 
        
        cvssV3_1
         
  | 
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Wazuh
         Wazuh wazuh  | 
|
| Vendors & Products | 
        
        Wazuh
         Wazuh wazuh  | 
Wed, 29 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 29 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.12.0, a buffer over-read occurs in w_expression_match() when strlen() is called on str_test, because the corresponding buffer is not being properly NULL terminated during its allocation in OS_CleanMSG(). A compromised agent can cause a READ operation beyond the end of the allocated buffer (which may contain sensitive information) by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause a buffer over-read and potentially access sensitive data. This vulnerability is fixed in 4.12.0. | |
| Title | Wazuh vulnerable to Heap-based Buffer Over-read in w_expression_match | |
| Weaknesses | CWE-126 CWE-170  | 
|
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-29T16:50:05.994Z
Updated: 2025-10-29T18:10:35.915Z
Reserved: 2025-10-22T18:55:48.011Z
Link: CVE-2025-62792
Updated: 2025-10-29T18:10:33.060Z
Status : Analyzed
Published: 2025-10-29T17:15:37.280
Modified: 2025-11-03T19:35:16.047
Link: CVE-2025-62792
No data.