Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.8

openITCOCKPIT Monitoring Tool Has Remote Code Execution Risk

CVE-2026-24892
Summary

The openITCOCKPIT monitoring tool has a security weakness that could allow an attacker to run malicious code on your server. This weakness is present in older versions of the Community Edition. To protect your server, update to the latest version of openITCOCKPIT, which fixes this issue. If you're not sure what version you're using, check with your IT team or the software provider.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
it-novum openitcockpit <= 5.4.0 –
Original title
openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP d...
Original description
openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP deserialization pattern in the processing of changelog entries. Serialized changelog data derived from attacker-influenced application state is unserialized without restricting allowed classes. Although no current application endpoint was found to introduce PHP objects into this data path, the presence of an unrestricted unserialize() call constitutes a latent PHP object injection vulnerability. If future code changes, plugins, or refactors introduce object values into this path, the vulnerability could become immediately exploitable with severe impact, including potential remote code execution.
nvd CVSS3.1 8.8
Vulnerability type
CWE-502 Deserialization of Untrusted Data
Published: 20 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026