Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
{ "github_reviewed_at": "2021-03-12T22:48:12Z", "cwe_ids": [ "CWE-20" ], "nvd_published_at": "2021-03-06T02:15:00Z", "severity": "HIGH", "github_reviewed": true }