NIXPKGS-2026-0332
GitHub issue
published on 26 Feb 2026
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
LibreNMS has Stored Cross-Site Scripting via unsanitized /port-groups name
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the port group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a port group, an HTTP POST request is sent to the Request-URI "/port-groups". The name of the newly created port group is stored in the value of the name parameter. After the port group is created, the entry is displayed along with relevant buttons such as Edit and Delete. This issue has been fixed in version 26.2.0.
References
- https://github.com/librenms/librenms/pull/19042 x_refsource_MISC
- https://github.com/librenms/librenms/commit/882fe6f90ea504a3732f83caf89bba7850a5699f x_refsource_MISC
- https://github.com/librenms/librenms/releases/tag/26.2.0 x_refsource_MISC
- https://github.com/librenms/librenms/security/advisories/GHSA-93fx-g747-695x x_refsource_CONFIRM
Affected products
librenms
- ==< 26.2.0
Package maintainers
-
@vidister Fiona Weber <v@vidister.de>
-
@NetaliDev Jennifer Graul <me@netali.de>
-
@yuyuyureka Yureka <yuka@yuka.dev>
-
@n0emis Ember Keske <nixpkgs@n0emis.network>
-
@johannwagner Johann Wagner <nix@wagner.digital>