Skip to content

0xjessie21/CVE-2025-24016

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Python 3.x

CVE-2025-24016

An unsafe deserialization vulnerability in Wazuh servers allows remote code execution through unsanitized dictionary injection in DAPI requests/responses. This issue arises from the way DistributedAPI parameters are serialized as JSON and then deserialized using the as_wazuh_object function in framework/wazuh/core/cluster/common.py.

If an attacker injects an unsanitized dictionary into a DAPI request or response, they can craft an unhandled exception (unhandled_exc), allowing arbitrary Python code execution.

Screenshot

cve-2025-24016

Disclaimer
This project is primarily built to be used as a standalone CLI tool. Running this exploit as a service may pose security risks. It's recommended to use with caution and additional security measures. DWYOR

Installation

git clone https://github.com/0xjessie21/CVE-2025-24016.git
cd CVE-2025-24016/
pip install -r requirements.txt

Usage

python3 CVE-2025-24016.py -h
Expand full help flags

This will display help for the tool. Here are all the switches it supports.

Usage:
  python3 CVE-2025-24016.py [flags]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Target URL (ex: https://<worker-server>:55000/security/user/authenticate/run_as)
  -i IP, --ip IP        Local host for reverse shell connection
  -p PORT, --port PORT  Local port for reverse shell connection

Credits


Contributors