NIXPKGS-2026-0331
GitHub issue
published on 26 Feb 2026
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
LibreNMS vulnerable to Stored Cross-site Scripting through unsanitized /device-groups name
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the device group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a device group, an HTTP POST request is sent to the Request-URI "/device-groups". The name of the newly created device group is stored in the value of the name parameter. After the device group is created, the entry is displayed along with relevant buttons such as Rediscover Devices, Edit, and Delete. This issue has been fixed in version 26.2.0.
References
- https://github.com/librenms/librenms/releases/tag/26.2.0 x_refsource_MISC
- https://github.com/librenms/librenms/security/advisories/GHSA-5pqf-54qp-32wx x_refsource_CONFIRM
- https://github.com/librenms/librenms/pull/19041 x_refsource_MISC
- https://github.com/librenms/librenms/commit/64b31da444369213eb4559ec1c304ebfaa0ba12c x_refsource_MISC
Affected products
librenms
- ==< 26.2.0
Package maintainers
-
@vidister Fiona Weber <v@vidister.de>
-
@NetaliDev Jennifer Graul <me@netali.de>
-
@yuyuyureka Yureka <yuka@yuka.dev>
-
@n0emis Ember Keske <nixpkgs@n0emis.network>
-
@johannwagner Johann Wagner <nix@wagner.digital>