mirror of
https://github.com/amidaware/rmmagent.git
synced 2026-04-26 14:55:47 +03:00
[GH-ISSUE #70] Embedded Python 3.11.9 in Tactical RMM Agent flagged by CVE-2025-13836 #44
Labels
No labels
bug
bug
enhancement
fixed
pull-request
question
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/rmmagent#44
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @nbruneau71250 on GitHub (Jan 9, 2026).
Original GitHub issue: https://github.com/amidaware/rmmagent/issues/70
Hello,
While running vulnerability scans with Wazuh on Windows endpoints, we consistently get alerts for CVE-2025-13836 related to an embedded Python interpreter shipped with the Tactical RMM agent.
Details:
The system-wide Python has already been fully removed, and the alert clearly points to the Python bundled with the Tactical RMM agent.
It appears that Python 3.11.9 is affected by CVE-2025-13836, and updating or rebuilding the agent with a patched Python version would resolve the issue.
Could you please confirm:
This is not a critical breakage, but it does generate persistent security alerts in enterprise environments.
Thanks for your work on Tactical RMM.
@wh1te909 commented on GitHub (Jan 9, 2026):
it will be updated at a later time, you can safely ignore this, as it’s not relevant to how the agent operates.