[Release] Checkmk stable release 2.3.0p38

Dear friends of Checkmk,

the new stable release 2.3.0p38 of Checkmk is ready for download.

This stable release ships with 1 changes affecting all editions of Checkmk,
2 changes for the Enterprise editions, 0 Cloud Edition specific and
0 Managed Services Edition specific changes.

Changes in all Checkmk Editions:

Setup

  • 17105 SEC: Fix secrets added to URL query params…

Changes in the Checkmk Enterprise Edition:

Agent Bakery

  • 18207 SEC: Fix security vulnerability in win_license.bat plugin…

Reporting & availability

  • 17984 SEC: Path-Traversal in report scheduler…

Changes in the Checkmk Cloud Edition:

NO CHANGES

Changes in the Checkmk Cloud (SaaS):

NO CHANGES

Changes in the Checkmk Managed Services Edition:

NO CHANGES

You can download Checkmk from our download page: Download Checkmk for free | Checkmk

List of all changes: Werks

We greatly thank you for using Checkmk and wish you a successful monitoring,

Your Checkmk Team

Currently those werk-links doesn’t work :slight_smile:

We are aware of it and on it.

1 Like

In the meantime…
Werk 17105

# Fix secrets added to URL query params

key        | value
---------- | ---
date       | 2025-08-07T13:29:59+00:00
version    | 2.4.0p13
class      | security
edition    | cre
component  | wato
level      | 1
compatible | yes

Previously, under specific conditions (toggling page navigation after receiving validation errors when submitting a form), passwords and other secrets entered in the form could be exposed in URL query parameters.
Importantly, this did not affect any stored secrets; only the data just entered by the user was at risk.
This could result in sensitive data being leaked, for example, to server logs.

Such sensitive information is now excluded from the URL query parameters.

This issue was reported to us by an external party.

*Affected Versions*:

* 2.4.0
* 2.3.0
* 2.2.0
* 2.1.0 (EOL)

*Vulnerability Management*:

We have rated the issue with a CVSS Score of 1.0 Low (`CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N`) and assigned `CVE-2025-32916`.

Werk 17984

# Path-Traversal in report scheduler

key        | value
---------- | ---
date       | 2025-08-13T06:11:20+00:00
version    | 2.4.0p13
class      | security
edition    | cee
component  | reporting
level      | 1
compatible | yes

Previous to this Werk it was possible that an authenticated user could perform Path-traversal
attacks against the site's local file directory by use of the report scheduler. This issue was made
possible due to insufficient escaping of macros which could allow an attacker to make use of a
generated `.mk` file to overide existing `.mk` files.

Performing such an action could allow an attacker to break a site's configurations however as an
attacker cannot break out of the predefined fields within the generated `.mk` file, this can only
be used to DoS / break an affected site.

We thank Lisa Gnedt (SBA Research) for reporting this issue.

*Affected Versions*:

* 2.4.0
* 2.3.0
* 2.2.0
* 2.1.0 (EOL)

*Mitigations*:

If you cannot update, it is advised that both the following roles `Manage Own Scheduled Reports`
which by default is set to `yes` and the `Manage All Scheduled Reports` both be set to `no` for
non-admin users within the site.

Furthermore, if you believe you may have been affected by this vulnerability that you conduct
a manual review of all scheduled reports within your site and remove any schedules that contain
titles with directory information.

*Indicators of Compromise*:

Checkmk will always generate both an `.mk` and `.pdf` file pair for each scheduled report.
Therefore, any affected path within the site's file system can be identified by existence `.pdf` /
`.mk`  report file pairs.

*Vulnerability Management*:

We have rated the issue with a CVSS Score of 7.1 High
(`CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N`) and assigned `CVE-2025-39664`.

Werk 18207

# Fix security vulnerability in win_license.bat plugin

key        | value
---------- | ---
date       | 2025-08-21T14:15:21+00:00
version    | 2.4.0p13
class      | security
edition    | cee
component  | agents
level      | 1
compatible | yes

On Windows hosts to force the English output from the `win_license.bat` plugin,
special copying logic is used (this way, the default `slmgr.vbs` script cannot find the language files).
As the script is copied to a global, unprotected location, every user has access to edit this script.
This can be exploited for malicious intent.
To eliminate this vulnerability, the `slmgr.vbs` script is copied to the protected location 
in `%SystemDrive%\ProgramData\checkmk\agent\tmp` and is deleted afterwards.

**Note:** Only users who use the Windows License plug-in are affected by this issue.

We thank Lisa Gnedt (SBA Research) for reporting this issue.

*Affected Versions*:

* 2.4.0
* 2.3.0
* 2.2.0
* 2.1.0 (EOL)

*Mitigations*:

If you cannot update, disable the Windows License plug-in.

*Vulnerability Management*:

We have rated the issue with a CVSS Score of 8.8 High (`CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H`) and assigned `CVE-2025-32919`.