CVE-2025-64483

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-64483
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64483.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64483
Aliases
  • GHSA-gwf3-8gm3-qrmj
Published
2025-11-21T17:55:33.219Z
Modified
2025-12-05T10:21:37.187311Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Wazuh API – Agent Configuration Has Improper Access Control in Agent Enrollment Endpoint
Details

Wazuh is a security detection, visibility, and compliance open source project. From version 4.9.0 to before 4.13.0, the Wazuh API – Agent Configuration in certain configurations allows authenticated users with read-only API roles to retrieve agent enrollment credentials through the /utils/configuration endpoint. These credentials can be used to register new agents within the same Wazuh tenant without requiring elevated permissions through the UI. This issue has been patched in version 4.13.0.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64483.json",
    "cwe_ids": [
        "CWE-284"
    ]
}
References

Affected packages

Git / github.com/wazuh/wazuh-dashboard-plugins

Affected ranges

Type
GIT
Repo
https://github.com/wazuh/wazuh-dashboard-plugins
Events

Affected versions

v4.*

v4.10.0
v4.10.1
v4.11.0
v4.11.1
v4.11.2
v4.12.0
v4.9.0
v4.9.1
v4.9.2