CVE-2025-39664

Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CheckmkCNA
---
---
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
VendorProductVersion
checkmkcheckmk
2.1.0 ≤
𝑥
< 2.2.0
checkmkcheckmk
2.2.0:p1
checkmkcheckmk
2.2.0:p10
checkmkcheckmk
2.2.0:p11
checkmkcheckmk
2.2.0:p12
checkmkcheckmk
2.2.0:p13
checkmkcheckmk
2.2.0:p14
checkmkcheckmk
2.2.0:p16
checkmkcheckmk
2.2.0:p17
checkmkcheckmk
2.2.0:p18
checkmkcheckmk
2.2.0:p19
checkmkcheckmk
2.2.0:p21
checkmkcheckmk
2.2.0:p22
checkmkcheckmk
2.2.0:p23
checkmkcheckmk
2.2.0:p24
checkmkcheckmk
2.2.0:p25
checkmkcheckmk
2.2.0:p26
checkmkcheckmk
2.2.0:p27
checkmkcheckmk
2.2.0:p28
checkmkcheckmk
2.2.0:p29
checkmkcheckmk
2.2.0:p3
checkmkcheckmk
2.2.0:p30
checkmkcheckmk
2.2.0:p31
checkmkcheckmk
2.2.0:p32
checkmkcheckmk
2.2.0:p33
checkmkcheckmk
2.2.0:p34
checkmkcheckmk
2.2.0:p35
checkmkcheckmk
2.2.0:p36
checkmkcheckmk
2.2.0:p37
checkmkcheckmk
2.2.0:p38
checkmkcheckmk
2.2.0:p39
checkmkcheckmk
2.2.0:p4
checkmkcheckmk
2.2.0:p40
checkmkcheckmk
2.2.0:p41
checkmkcheckmk
2.2.0:p42
checkmkcheckmk
2.2.0:p43
checkmkcheckmk
2.2.0:p44
checkmkcheckmk
2.2.0:p45
checkmkcheckmk
2.2.0:p5
checkmkcheckmk
2.2.0:p6
checkmkcheckmk
2.2.0:p7
checkmkcheckmk
2.2.0:p8
checkmkcheckmk
2.2.0:p9
checkmkcheckmk
2.3.0
checkmkcheckmk
2.3.0:p1
checkmkcheckmk
2.3.0:p10
checkmkcheckmk
2.3.0:p11
checkmkcheckmk
2.3.0:p12
checkmkcheckmk
2.3.0:p13
checkmkcheckmk
2.3.0:p14
checkmkcheckmk
2.3.0:p15
checkmkcheckmk
2.3.0:p16
checkmkcheckmk
2.3.0:p17
checkmkcheckmk
2.3.0:p18
checkmkcheckmk
2.3.0:p19
checkmkcheckmk
2.3.0:p2
checkmkcheckmk
2.3.0:p20
checkmkcheckmk
2.3.0:p21
checkmkcheckmk
2.3.0:p22
checkmkcheckmk
2.3.0:p23
checkmkcheckmk
2.3.0:p24
checkmkcheckmk
2.3.0:p25
checkmkcheckmk
2.3.0:p26
checkmkcheckmk
2.3.0:p27
checkmkcheckmk
2.3.0:p28
checkmkcheckmk
2.3.0:p29
checkmkcheckmk
2.3.0:p3
checkmkcheckmk
2.3.0:p30
checkmkcheckmk
2.3.0:p31
checkmkcheckmk
2.3.0:p32
checkmkcheckmk
2.3.0:p33
checkmkcheckmk
2.3.0:p34
checkmkcheckmk
2.3.0:p35
checkmkcheckmk
2.3.0:p36
checkmkcheckmk
2.3.0:p37
checkmkcheckmk
2.3.0:p4
checkmkcheckmk
2.3.0:p5
checkmkcheckmk
2.3.0:p6
checkmkcheckmk
2.3.0:p7
checkmkcheckmk
2.3.0:p8
checkmkcheckmk
2.3.0:p9
checkmkcheckmk
2.4.0
checkmkcheckmk
2.4.0:p1
checkmkcheckmk
2.4.0:p10
checkmkcheckmk
2.4.0:p11
checkmkcheckmk
2.4.0:p12
checkmkcheckmk
2.4.0:p2
checkmkcheckmk
2.4.0:p3
checkmkcheckmk
2.4.0:p4
checkmkcheckmk
2.4.0:p5
checkmkcheckmk
2.4.0:p6
checkmkcheckmk
2.4.0:p7
checkmkcheckmk
2.4.0:p8
checkmkcheckmk
2.4.0:p9
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
check-mk
questing
dne
plucky
dne
noble
dne
jammy
dne
bionic
needs-triage
xenial
needs-triage