Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-86rg-8hc8-v82p

Опубликовано: 13 окт. 2025
Источник: github
Github: Прошло ревью
CVSS4: 5.5

Описание

LibreNMS is vulnerable to Reflected-XSS in report_this function

Summary

Reflected-XSS in report_this function in librenms/includes/functions.php

Details

Recently, it was discovered that the report_this function had improper filtering (htmlentities function was incorrectly used in a href environment), which caused the project_issues parameter to trigger an XSS vulnerability.

The Vulnerable Sink: https://github.com/librenms/librenms/blob/master/includes/functions.php#L444

PoC

GET project_issues=javascript:alert(document.cookie)

Impact

XSS vulnerabilities allow attackers to execute malicious scripts in users' browsers, enabling unauthorized access to sensitive data, session hijacking, or malware distribution.

Suggestion

It is recommended to filter dangerous protocols, e.g. javascript:/file:.

Пакеты

Наименование

librenms/librenms

composer
Затронутые версииВерсия исправления

<= 25.6.0

25.7.0

EPSS

Процентиль: 0%
0.00003
Низкий

5.5 Medium

CVSS4

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
4 месяца назад

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to 25.7.0, there is a reflected-XSS in `report_this` function in `librenms/includes/functions.php`. The `report_this` function had improper filtering (`htmlentities` function was incorrectly use in a href environment), which caused the `project_issues` parameter to trigger an XSS vulnerability. This vulnerability is fixed in 25.7.0.

EPSS

Процентиль: 0%
0.00003
Низкий

5.5 Medium

CVSS4

Дефекты

CWE-79