NIXPKGS-2026-0328
GitHub issue
published on 26 Feb 2026
Permalink
CVE-2026-26989
4.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
LibreNMS has Stored XSS in Alert Rule
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below are affected by a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Rules workflow. An attacker with administrative privileges can inject malicious scripts that execute in the browser context of any user who accesses the Alert Rules page. This issue has been fixed in version 26.2.0.
References
- https://github.com/librenms/librenms/security/advisories/GHSA-6xmx-xr9p-58p7 x_refsource_CONFIRM
- https://github.com/librenms/librenms/pull/19039 x_refsource_MISC
- https://github.com/librenms/librenms/commit/087608cf9f851189847cb8e8e5ad002e59170c58 x_refsource_MISC
- https://github.com/librenms/librenms/releases/tag/26.2.0 x_refsource_MISC
Affected products
librenms
- ==< 26.2.0
Package maintainers
-
@vidister Fiona Weber <v@vidister.de>
-
@NetaliDev Jennifer Graul <me@netali.de>
-
@yuyuyureka Yureka <yuka@yuka.dev>
-
@n0emis Ember Keske <nixpkgs@n0emis.network>
-
@johannwagner Johann Wagner <nix@wagner.digital>