Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-45160

Опубликовано: 29 янв. 2026
Источник: debian

Описание

A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cactifixed1.2.27+ds1-1package
cactifixed1.2.24+ds1-1+deb12u3bookwormpackage
cactipostponedbullseyepackage

Примечания

  • https://gist.github.com/BEND0US/49d76897a5bb676d8c3f51425553cc32

  • Upstream confirmed it is covered/fixed with same fixes for CVE-2023-50250 and

  • the followup CVE-2024-29894. Consider it as fixed with the update including

  • both updates.

Связанные уязвимости

CVSS3: 5.4
ubuntu
10 дней назад

A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.

CVSS3: 5.4
nvd
10 дней назад

A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.

CVSS3: 5.4
github
10 дней назад

A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page.