Changeflow GovPing Data Privacy & Cybersecurity Checkmk Critical XSS Vulnerabilities
Priority review Notice Added Final

Checkmk Critical XSS Vulnerabilities

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued a critical security advisory (WID-SEC-2026-0928) regarding multiple Cross-Site Scripting (XSS) vulnerabilities in Checkmk IT monitoring software. The vulnerabilities affect versions prior to 2.6.0b1 and 2.5.0b2, with a CVSS Base Score of 9.0 (critical). Organizations running affected Checkmk deployments should apply mitigations immediately.

Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-Bund published advisory WID-SEC-2026-0928 disclosing multiple critical XSS vulnerabilities in Checkmk monitoring software. The vulnerabilities allow remote attackers to execute malicious scripts. Affected versions include Checkmk prior to 2.6.0b1 and 2.5.0b2, running on Linux and UNIX systems. The CVSS Base Score is 9.0 (critical) with a Temporal Score of 7.8 (high).

Organizations running Checkmk deployments should verify their installed versions and apply available patches to upgrade to a secure version. As this is a critical vulnerability with remote attack capability, patching should be prioritized. No specific compliance deadline is stated in the advisory; organizations should treat this as requiring immediate attention.

What to do next

  1. Identify Checkmk installations within your IT infrastructure
  2. Check installed versions against affected versions (<2.6.0b1, <2.5.0b2)
  3. Apply available patches or mitigations to upgrade to a secure version

Archived snapshot

Mar 31, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-0928] Checkmk: Mehrere Schwachstellen ermöglichen Cross-Site Scripting CVSS Base Score 9.0 (kritisch) CVSS Temporal Score 7.8 (hoch) Remoteangriff ja Datum 30.03.2026 Stand 31.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX

Produktbeschreibung

Checkmk ist eine IT-Monitoring-Software.

Produkte

30.03.2026
- Checkmk Checkmk <2.6.0b1

  • Checkmk Checkmk <2.5.0b2

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Checkmk ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
March 30th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
WID-SEC-2026-0928

Who this affects

Applies to
Technology companies Government agencies
Industry sector
5112 Software & Technology
Activity scope
IT Security Vulnerability Management Software Patch Management
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Data Privacy Critical Infrastructure

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!