openITCOCKPIT Command Injection: RCE for Authenticated Users

openITCOCKPIT Command Injection: RCE for Authenticated Users

The National Vulnerability Database (NVD) has detailed CVE-2026-24893, a critical command injection vulnerability impacting openITCOCKPIT Community Edition versions prior to 5.5.2. This flaw allows an authenticated user, provided they have permissions to add or modify hosts, to execute arbitrary operating system commands on the monitoring backend. This is a significant security hole, rated with a CVSS score of 8.8 (HIGH), indicating a substantial risk.

The root cause, as outlined by the NVD, lies in how user-controlled host attributes – specifically the host address – are handled. These attributes are expanded into monitoring command templates without proper validation, escaping, or quoting. When these templates are subsequently executed by the underlying monitoring engine, such as Nagios or Icinga, via a shell, it directly leads to remote code execution (RCE). Essentially, an attacker can trick the system into running malicious commands by crafting a specially formed host address.

This is a classic case of improper input validation (CWE-20) leading directly to OS command injection (CWE-78). The fix, available in openITCOCKPIT Community Edition version 5.5.2, addresses this critical oversight, ensuring that user inputs are properly sanitized before being passed to system commands. For any organization running openITCOCKPIT, patching is not just recommended, it’s absolutely essential to prevent potential compromise.

Related ATT&CK Techniques

🛡️ Detection Rules

6 rules · 5 SIEM formats

6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-24893

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-24893 Command Injection openITCOCKPIT Community Edition < 5.5.2
CVE-2026-24893 RCE openITCOCKPIT Community Edition < 5.5.2
CVE-2026-24893 Command Injection Vulnerable component: host address attribute in monitoring command templates

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs