Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0332

NIXPKGS-2026-0332
published on 26 Feb 2026
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
LibreNMS has Stored Cross-Site Scripting via unsanitized /port-groups name

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the port group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a port group, an HTTP POST request is sent to the Request-URI "/port-groups". The name of the newly created port group is stored in the value of the name parameter. After the port group is created, the entry is displayed along with relevant buttons such as Edit and Delete. This issue has been fixed in version 26.2.0.

Affected products

librenms
  • ==< 26.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/librenms/librenms/security/advisories/GHSA-93fx-g747-695x
Upstream patch: https://github.com/librenms/librenms/commit/882fe6f90ea504a3732f83caf89bba7850a5699f