librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):`/device/$DEVICE_ID/edit` -> param: display. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/librenms/librenms/security/advisories/GHSA-pm8j-3v64-92cq | Exploit Vendor Advisory |
Configurations
History
28 Apr 2025, 16:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/librenms/librenms/security/advisories/GHSA-pm8j-3v64-92cq - Exploit, Vendor Advisory | |
Summary |
|
|
First Time |
Librenms librenms
Librenms |
|
CPE | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* |
16 Jan 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-16 23:15
Updated : 2025-04-28 16:44
NVD link : CVE-2025-23198
Mitre link : CVE-2025-23198
CVE.ORG link : CVE-2025-23198
JSON object : View
Products Affected
librenms
- librenms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')