CVE-2026-24095
Description
Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p21, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows users with the "Use WATO" permission to access the "Analyze configuration" page by directly navigating to its URL, bypassing the intended "Access analyze configuration" permission check. If these users also have the "Make changes, perform actions" permission, they can perform unauthorized actions such as disabling checks or acknowledging results.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Checkmk fails to enforce the 'Access analyze configuration' permission, allowing users with 'Use WATO' to access and potentially modify monitoring checks via direct URL.
The vulnerability lies in the improper permission enforcement of the 'Analyze configuration' page in Checkmk. The page only hid the menu link from users lacking the 'Access analyze configuration' permission, but did not perform a server-side permission check. Consequently, users with the 'Use WATO' permission could access the page by directly entering its URL, bypassing the intended access control [1].
Exploitation requires the attacker to have the 'Use WATO' permission, which is granted to default roles such as 'Normal monitoring user'. If the attacker also possesses the 'Make changes, perform actions' permission, they can perform unauthorized actions on the page, such as disabling monitoring checks or acknowledging check results. No additional authentication or network position is needed beyond having a valid account with these permissions [1].
The impact includes unauthorized access to configuration analysis and potential modification of monitoring checks, which could lead to loss of visibility into system health or false acknowledgments of issues. The vulnerability is rated CVSS 5.3 Medium, reflecting the need for authenticated access but the potential for low-level integrity and confidentiality impact [1].
Checkmk has addressed the issue in versions 2.4.0p21 and 2.3.0p43. Version 2.2.0 is end-of-life and will not receive a patch. Users are advised to upgrade to the latest patched versions and validate that all desired checks in 'Analyze configuration' are enabled and that no findings are unexpectedly acknowledged [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.