Browse all 39 CVE security advisories affecting Wazuh. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Wazuh is an open-source security platform primarily utilized for intrusion detection, log data analysis, and compliance monitoring across diverse infrastructure environments. Its architecture integrates host-based agents with a central server to aggregate telemetry, enabling organizations to detect anomalies and maintain regulatory adherence. Historically, the software has been associated with vulnerabilities such as remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls within its web interface and API components. With thirty-nine recorded CVEs, these issues highlight risks related to authentication bypasses and insecure default configurations. While no catastrophic breaches have been publicly attributed directly to Wazuh itself, the frequency of these CVEs underscores the importance of rigorous patch management and secure deployment practices to mitigate potential exploitation vectors in enterprise security operations.
This page lists every published CVE security advisory associated with Wazuh. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.