vendor:
Nagios Log Server
by:
Seth Kraft, Alex Tisdale
8.1
CVSS
CRITICAL
Information Disclosure, Improper Access Control
200, 284, 522
CWE
Product Name: Nagios Log Server
Affected Version From: Nagios Log Server 2024R1.3.1 and below
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:nagios:nagios_log_server:2024R1.3.1
Platforms Tested: Ubuntu 20.04
2025
Nagios Log Server 2024R1.3.1 – API Key Exposure
An API-level vulnerability in Nagios Log Server 2024R1.3.1 allows any user with a valid API token to retrieve a full list of user accounts along with their plaintext API keys, including administrator credentials. This flaw enables user enumeration, privilege escalation, and full system compromise via unauthorized use of exposed tokens.
Mitigation:
To mitigate this vulnerability, it is recommended to update Nagios Log Server to a patched version where API key exposure is addressed.