Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: librenms

Found 7 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-27016
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
LibreNMS has Stored XSS in Custom OID - unit parameter missing strip_tags()

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 24.10.0 through 26.1.1 are vulnerable to Stored XSS via the unit parameter in Custom OID. The Custom OID functionality lacks strip_tags() sanitization while other fields (name, oid, datatype) are sanitized. The unsanitized value is stored in the database and rendered without HTML escaping. This issue is fixed in version 26.2.0.

Affected products

librenms
  • ==>= 24.10.0, < 26.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/librenms/librenms/security/advisories/GHSA-fqx6-693c-f55g
Upstream patch: https://github.com/librenms/librenms/commit/3bea263e02441690c01dea7fa3fe6ffec94af335
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
LibreNMS has Stored Cross-Site Scripting via unsanitized /port-groups name

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the port group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a port group, an HTTP POST request is sent to the Request-URI "/port-groups". The name of the newly created port group is stored in the value of the name parameter. After the port group is created, the entry is displayed along with relevant buttons such as Edit and Delete. This issue has been fixed in version 26.2.0.

Affected products

librenms
  • ==< 26.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/librenms/librenms/security/advisories/GHSA-93fx-g747-695x
Upstream patch: https://github.com/librenms/librenms/commit/882fe6f90ea504a3732f83caf89bba7850a5699f
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
LibreNMS vulnerable to Stored Cross-site Scripting through unsanitized /device-groups name

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the device group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a device group, an HTTP POST request is sent to the Request-URI "/device-groups". The name of the newly created device group is stored in the value of the name parameter. After the device group is created, the entry is displayed along with relevant buttons such as Rediscover Devices, Edit, and Delete. This issue has been fixed in version 26.2.0.

Affected products

librenms
  • ==< 26.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/librenms/librenms/security/advisories/GHSA-5pqf-54qp-32wx
Upstream patch: https://github.com/librenms/librenms/commit/64b31da444369213eb4559ec1c304ebfaa0ba12c
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
LibreNMS: SQL Injection in ajax_table.php spreads through a covert data stream

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the address parameter is split into an address and a prefix, and the prefix portion is directly concatenated into the SQL query string without validation. This allows an attacker to inject arbitrary SQL commands, potentially leading to unauthorized data access or database manipulation. This issue has been fixed in version 26.2.0.

Affected products

librenms
  • ==< 26.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/librenms/librenms/security/advisories/GHSA-h3rv-q4rq-pqcv
Upstream patch: https://github.com/librenms/librenms/commit/15429580baba03ed1dd377bada1bde4b7a1175a1
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
LibreNMS affected by reflected XSS via email field

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below are vulnerable to Reflected XSS attacks via email field. This issue has been fixed in version 26.2.0.

Affected products

librenms
  • ==< 26.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/librenms/librenms/security/advisories/GHSA-gqx7-99jw-6fpr
Upstream patch: https://github.com/librenms/librenms/commit/8e626b38ef92e240532cdac2ac7e38706a71208b
Permalink CVE-2026-26989
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
LibreNMS has Stored XSS in Alert Rule

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below are affected by a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Rules workflow. An attacker with administrative privileges can inject malicious scripts that execute in the browser context of any user who accesses the Alert Rules page. This issue has been fixed in version 26.2.0.

Affected products

librenms
  • ==< 26.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/librenms/librenms/security/advisories/GHSA-6xmx-xr9p-58p7
Upstream patch: https://github.com/librenms/librenms/commit/087608cf9f851189847cb8e8e5ad002e59170c58
Permalink CVE-2026-26990
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
LibreNMS has Time-Based Blind SQL Injection in address-search.inc.php

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below have a Time-Based Blind SQL Injection vulnerability in address-search.inc.php via the address parameter. When a crafted subnet prefix is supplied, the prefix value is concatenated directly into an SQL query without proper parameter binding, allowing an attacker to manipulate query logic and infer database information through time-based conditional responses. This vulnerability requires authentication and is exploitable by any authenticated user. This issue has been fixedd in version 26.2.0.

Affected products

librenms
  • ==< 26.2.0

Matching in nixpkgs

Package maintainers

https://github.com/librenms/librenms/commit/15429580baba03ed1dd377bada1bde4b7a1175a1
https://github.com/librenms/librenms/pull/18777
https://github.com/librenms/librenms/security/advisories/GHSA-79q9-wc6p-cf92