Disclosure
Production RCE Chain via Wazuh Agent Group Configuration Injection
Through the Wazuh API, an attacker can achieve Remote Code Execution on production by: 1. Creating a new agent group 2. Uploading a configuration with localfile commands 3. Assigning the production agent to that group 4. Restarting the agent to apply the configuration
- Target
- African Crypto Exchange
- Category
- RCE
- Channel
- HackerOne
- Disclosed
- 2026-03
Redaction note
Vendor identity withheld.
This finding is documented here as part of MemCyber’s public disclosure record. The vendor has been anonymized to a sector and region descriptor. Full technical detail — including root cause, reproducible proof-of-concept, remediation guidance, and vendor attribution where granted — is available to qualified prospects under NDA.
Coordinated disclosure
How we handled it.
- Reported to the vendor via HackerOne with a reproducible proof-of-concept.
- Triage + remediation window coordinated with the vendor security team.
- Fix verified before any public reference.
- This record published only after the embargo period closed.