Skip to main content
MemCyber
Critical CVSS 9.8 RCE HackerOne

Disclosure

Production RCE Chain via Wazuh Agent Group Configuration Injection

Through the Wazuh API, an attacker can achieve Remote Code Execution on production by: 1. Creating a new agent group 2. Uploading a configuration with localfile commands 3. Assigning the production agent to that group 4. Restarting the agent to apply the configuration

Target
African Crypto Exchange
Category
RCE
Channel
HackerOne
Disclosed
2026-03

Redaction note

Vendor identity withheld.

This finding is documented here as part of MemCyber’s public disclosure record. The vendor has been anonymized to a sector and region descriptor. Full technical detail — including root cause, reproducible proof-of-concept, remediation guidance, and vendor attribution where granted — is available to qualified prospects under NDA.

Coordinated disclosure

How we handled it.

  • Reported to the vendor via HackerOne with a reproducible proof-of-concept.
  • Triage + remediation window coordinated with the vendor security team.
  • Fix verified before any public reference.
  • This record published only after the embargo period closed.

Similar category

Want the full technical detail?

Named vendor, PoC, remediation — shared under NDA.