Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://checkmk.com/werk/17989 |
|
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p16:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p17:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p18:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p19:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p20:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p21:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p22:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p23:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p24:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p25:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.5.0:b1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.5.0:b2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.5.0:b3:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Tue, 14 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Fri, 10 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Livestatus injection in the notification test mode in Checkmk <2.5.0b4 and <2.4.0p26 allows an authenticated user with access to the notification test page to inject arbitrary Livestatus commands via a crafted service description. | |
| Title | Potential livestatus injection in notification test | |
| First Time appeared |
Checkmk
Checkmk checkmk |
|
| Weaknesses | CWE-140 | |
| CPEs | cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Checkmk
Checkmk checkmk |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Checkmk
Published:
Updated: 2026-04-14T13:29:54.362Z
Reserved: 2026-03-20T10:30:13.353Z
Link: CVE-2026-33456
Updated: 2026-04-10T12:47:46.627Z
Status : Analyzed
Published: 2026-04-10T09:16:24.493
Modified: 2026-04-20T17:10:06.623
Link: CVE-2026-33456
No data.
OpenCVE Enrichment
Updated: 2026-04-13T13:06:16Z