librenms CVE Vulnerabilities & Metrics

Focus on librenms vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About librenms Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with librenms. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total librenms CVEs: 75
Earliest CVE date: 09 Nov 2017, 22:29 UTC
Latest CVE date: 15 Nov 2024, 16:15 UTC

Latest CVE reference: CVE-2024-52526

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 20

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 66.67%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 66.67%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical librenms CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.29

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 48
4.0-6.9 23
7.0-8.9 3
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS librenms CVEs

These are the five CVEs with the highest CVSS scores for librenms, sorted by severity first and recency.

All CVEs for librenms

CVE-2024-52526 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Services" tab of the Device page allows authenticated users to inject arbitrary JavaScript through the "descr" parameter when adding a service to a device. This vulnerability could result in the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0.

CVE-2024-51497 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Custom OID" tab of a device allows authenticated users to inject arbitrary JavaScript through the "unit" parameter when creating a new OID. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0.

CVE-2024-51495 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the Device Overview page allows authenticated users to inject arbitrary JavaScript through the "overwrite_ip" parameter when editing a device. This vulnerability results in the execution of malicious code when the device overview page is visited, potentially compromising the accounts of other users. This vulnerability is fixed in 24.10.0.

CVE-2024-51494 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Port Settings" page allows authenticated users to inject arbitrary JavaScript through the "descr" parameter when editing a device's port settings. This vulnerability can lead to the execution of malicious code when the "Port Settings" page is visited, potentially compromising the user's session and allowing unauthorized actions. This vulnerability is fixed in 24.10.0.

CVE-2024-50355 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0.

CVE-2024-50352 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Services" section of the Device Overview page allows authenticated users to inject arbitrary JavaScript through the "name" parameter when adding a service to a device. This vulnerability could result in the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0.

CVE-2024-50350 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Port Settings" page allows authenticated users to inject arbitrary JavaScript through the "name" parameter when creating a new Port Group. This vulnerability results in the execution of malicious code when the "Port Settings" page is visited after the affected Port Group is added to a device, potentially compromising user sessions and allowing unauthorized actions. This vulnerability is fixed in 24.10.0.

CVE-2024-49764 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Capture Debug Information" page allows authenticated users to inject arbitrary JavaScript through the "hostname" parameter when creating a new device. This vulnerability results in the execution of malicious code when the "Capture Debug Information" page is visited, redirecting the user and sending non-httponly cookies to an attacker-controlled domain. This vulnerability is fixed in 24.10.0.

CVE-2024-49759 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Manage User Access" page allows authenticated users to inject arbitrary JavaScript through the "bill_name" parameter when creating a new bill. This vulnerability can lead to the execution of malicious code when visiting the "Bill Access" dropdown in the user's "Manage Access" page, potentially compromising user sessions and allowing unauthorized actions. This vulnerability is fixed in 24.10.0.

CVE-2024-49758 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can add Notes to a device, the application did not properly sanitize the user input, when the ExamplePlugin enable, if java script code is inside the device's Notes, its will be trigger. This vulnerability is fixed in 24.10.0.

CVE-2024-49754 librenms vulnerability CVSS: 0 15 Nov 2024, 16:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the API-Access page allows authenticated users to inject arbitrary JavaScript through the "token" parameter when creating a new API token. This vulnerability can result in the execution of malicious code in the context of other users' sessions, compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0.

CVE-2024-47528 librenms vulnerability CVSS: 0 01 Oct 2024, 21:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Stored Cross-Site Scripting (XSS) can be achieved by uploading a new Background for a Custom Map. Users with "admin" role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger on load. This led to Stored Cross-Site Scripting (XSS). The vulnerability is fixed in 24.9.0.

CVE-2024-47527 librenms vulnerability CVSS: 0 01 Oct 2024, 21:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Device Dependencies" feature allows authenticated users to inject arbitrary JavaScript through the device name ("hostname" parameter). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0.

CVE-2024-47526 librenms vulnerability CVSS: 0 01 Oct 2024, 21:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Self Cross-Site Scripting (Self-XSS) vulnerability in the "Alert Templates" feature allows users to inject arbitrary JavaScript into the alert template's name. This script executes immediately upon submission but does not persist after a page refresh.

CVE-2024-47525 librenms vulnerability CVSS: 0 01 Oct 2024, 21:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Alert Rules" feature allows authenticated users to inject arbitrary JavaScript through the "Title" field. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0.

CVE-2024-47524 librenms vulnerability CVSS: 0 01 Oct 2024, 21:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can create a Device Groups, the application did not properly sanitize the user input in the Device Groups name, when user see the detail of the Device Group, if java script code is inside the name of the Device Groups, its will be trigger. This vulnerability is fixed in 24.9.0.

CVE-2024-47523 librenms vulnerability CVSS: 0 01 Oct 2024, 21:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Alert Transports" feature allows authenticated users to inject arbitrary JavaScript through the "Details" section (which contains multiple fields depending on which transport is selected at that moment). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0.

CVE-2024-32480 librenms vulnerability CVSS: 0 22 Apr 2024, 23:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. Version 24.4.0 fixes the issue.

CVE-2024-32479 librenms vulnerability CVSS: 0 22 Apr 2024, 22:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability.

CVE-2024-32461 librenms vulnerability CVSS: 0 22 Apr 2024, 22:15 UTC

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability.

CVE-2023-48294 librenms vulnerability CVSS: 0 17 Nov 2023, 22:15 UTC

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. In affected versions of LibreNMS when a user accesses their device dashboard, one request is sent to `graph.php` to access graphs generated on the particular Device. This request can be accessed by a low privilege user and they can enumerate devices on librenms with their id or hostname. Leveraging this vulnerability a low privilege user can see all devices registered by admin users. This vulnerability has been addressed in commit `489978a923` which has been included in release version 23.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-46745 librenms vulnerability CVSS: 0 17 Nov 2023, 22:15 UTC

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. In affected versions the login method has no rate limit. An attacker may be able to leverage this vulnerability to gain access to user accounts. This issue has been addressed in version 23.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-48295 librenms vulnerability CVSS: 0 17 Nov 2023, 21:15 UTC

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. Affected versions are subject to a cross site scripting (XSS) vulnerability in the device group popups. This issue has been addressed in commit `faf66035ea` which has been included in release version 23.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-5591 librenms vulnerability CVSS: 0 16 Oct 2023, 01:15 UTC

SQL Injection in GitHub repository librenms/librenms prior to 23.10.0.

CVE-2023-5060 librenms vulnerability CVSS: 0 19 Sep 2023, 03:15 UTC

Cross-site Scripting (XSS) - DOM in GitHub repository librenms/librenms prior to 23.9.1.

CVE-2023-4982 librenms vulnerability CVSS: 0 15 Sep 2023, 01:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 23.9.0.

CVE-2023-4981 librenms vulnerability CVSS: 0 15 Sep 2023, 01:15 UTC

Cross-site Scripting (XSS) - DOM in GitHub repository librenms/librenms prior to 23.9.0.

CVE-2023-4980 librenms vulnerability CVSS: 0 15 Sep 2023, 01:15 UTC

Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 23.9.0.

CVE-2023-4979 librenms vulnerability CVSS: 0 15 Sep 2023, 01:15 UTC

Cross-site Scripting (XSS) - Reflected in GitHub repository librenms/librenms prior to 23.9.0.

CVE-2023-4978 librenms vulnerability CVSS: 0 15 Sep 2023, 01:15 UTC

Cross-site Scripting (XSS) - DOM in GitHub repository librenms/librenms prior to 23.9.0.

CVE-2023-4977 librenms vulnerability CVSS: 0 15 Sep 2023, 01:15 UTC

Code Injection in GitHub repository librenms/librenms prior to 23.9.0.

CVE-2023-4347 librenms vulnerability CVSS: 0 15 Aug 2023, 02:15 UTC

Cross-site Scripting (XSS) - Reflected in GitHub repository librenms/librenms prior to 23.8.0.

CVE-2022-4070 librenms vulnerability CVSS: 0 20 Nov 2022, 05:15 UTC

Insufficient Session Expiration in GitHub repository librenms/librenms prior to 22.10.0.

CVE-2022-4069 librenms vulnerability CVSS: 0 20 Nov 2022, 05:15 UTC

Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0.

CVE-2022-4068 librenms vulnerability CVSS: 0 20 Nov 2022, 05:15 UTC

A user is able to enable their own account if it was disabled by an admin while the user still holds a valid session. Moreover, the username is not properly sanitized in the admin user overview. This enables an XSS attack that enables an attacker with a low privilege user to execute arbitrary JavaScript in the context of an admin's account.

CVE-2022-4067 librenms vulnerability CVSS: 0 20 Nov 2022, 05:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.

CVE-2022-3562 librenms vulnerability CVSS: 0 20 Nov 2022, 05:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.

CVE-2022-3561 librenms vulnerability CVSS: 0 20 Nov 2022, 05:15 UTC

Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0.

CVE-2022-3525 librenms vulnerability CVSS: 0 20 Nov 2022, 05:15 UTC

Deserialization of Untrusted Data in GitHub repository librenms/librenms prior to 22.10.0.

CVE-2022-3516 librenms vulnerability CVSS: 0 20 Nov 2022, 05:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.

CVE-2022-3231 librenms vulnerability CVSS: 0 17 Sep 2022, 17:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.9.0.

CVE-2022-36746 librenms vulnerability CVSS: 0 30 Aug 2022, 22:15 UTC

LibreNMS v22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component oxidized-cfg-check.inc.php.

CVE-2022-36745 librenms vulnerability CVSS: 0 30 Aug 2022, 22:15 UTC

LibreNMS v22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component print-customoid.php.

CVE-2022-29712 librenms vulnerability CVSS: 7.5 02 Jun 2022, 14:15 UTC

LibreNMS v22.3.0 was discovered to contain multiple command injection vulnerabilities via the service_ip, hostname, and service_param parameters.

CVE-2022-29711 librenms vulnerability CVSS: 4.3 02 Jun 2022, 14:15 UTC

LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php.

CVE-2022-0772 librenms vulnerability CVSS: 3.5 27 Feb 2022, 22:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.2.2.

CVE-2022-0589 librenms vulnerability CVSS: 3.5 15 Feb 2022, 09:15 UTC

Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.

CVE-2022-0588 librenms vulnerability CVSS: 4.0 15 Feb 2022, 08:15 UTC

Missing Authorization in Packagist librenms/librenms prior to 22.2.0.

CVE-2022-0587 librenms vulnerability CVSS: 4.0 15 Feb 2022, 08:15 UTC

Improper Authorization in Packagist librenms/librenms prior to 22.2.0.

CVE-2022-0580 librenms vulnerability CVSS: 6.5 14 Feb 2022, 23:15 UTC

Incorrect Authorization in Packagist librenms/librenms prior to 22.2.0.

CVE-2022-0576 librenms vulnerability CVSS: 4.3 14 Feb 2022, 12:15 UTC

Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.

CVE-2022-0575 librenms vulnerability CVSS: 3.5 14 Feb 2022, 12:15 UTC

Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.

CVE-2021-44278 librenms vulnerability CVSS: 7.5 03 Dec 2021, 13:15 UTC

Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php.

CVE-2021-44279 librenms vulnerability CVSS: 4.3 01 Dec 2021, 14:15 UTC

Librenms 21.11.0 is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.

CVE-2021-44277 librenms vulnerability CVSS: 4.3 01 Dec 2021, 14:15 UTC

Librenms 21.11.0 is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.

CVE-2021-43324 librenms vulnerability CVSS: 4.3 03 Nov 2021, 15:15 UTC

LibreNMS through 21.10.2 allows XSS via a widget title.

CVE-2021-31274 librenms vulnerability CVSS: 3.5 08 Sep 2021, 18:15 UTC

In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed.

CVE-2020-35700 librenms vulnerability CVSS: 6.5 08 Feb 2021, 09:15 UTC

A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint.

CVE-2020-15877 librenms vulnerability CVSS: 6.5 21 Jul 2020, 17:15 UTC

An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.

CVE-2020-15873 librenms vulnerability CVSS: 4.0 21 Jul 2020, 17:15 UTC

In LibreNMS before 1.65.1, an authenticated attacker can achieve SQL Injection via the customoid.inc.php device_id POST parameter to ajax_form.php.

CVE-2019-12465 librenms vulnerability CVSS: 5.5 09 Sep 2019, 14:15 UTC

An issue was discovered in LibreNMS 1.50.1. A SQL injection flaw was identified in the ajax_rulesuggest.php file where the term parameter is used insecurely in a database query for showing columns of a table, as demonstrated by an ajax_rulesuggest.php?debug=1&term= request.

CVE-2019-12464 librenms vulnerability CVSS: 6.0 09 Sep 2019, 14:15 UTC

An issue was discovered in LibreNMS 1.50.1. An authenticated user can perform a directory traversal attack against the /pdf.php file with a partial filename in the report parameter, to cause local file inclusion resulting in code execution.

CVE-2019-12463 librenms vulnerability CVSS: 6.5 09 Sep 2019, 14:15 UTC

An issue was discovered in LibreNMS 1.50.1. The scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php and html/graph-realtime.php scripts. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files. NOTE: relative to CVE-2019-10665, this requires authentication and the pathnames differ.

CVE-2019-10671 librenms vulnerability CVSS: 6.5 09 Sep 2019, 14:15 UTC

An issue was discovered in LibreNMS through 1.47. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as demonstrated by the graph.php sort parameter.

CVE-2019-10670 librenms vulnerability CVSS: 4.3 09 Sep 2019, 14:15 UTC

An issue was discovered in LibreNMS through 1.47. Many of the scripts rely on the function mysqli_escape_real_string for filtering data. However, this is particularly ineffective when returning user supplied input in an HTML or a JavaScript context, resulting in unsafe data being injected into these contexts, leading to attacker controlled JavaScript executing in the browser. One example of this is the string parameter in html/pages/inventory.inc.php.

CVE-2019-10669 librenms vulnerability CVSS: 6.5 09 Sep 2019, 13:15 UTC

An issue was discovered in LibreNMS through 1.47. There is a command injection vulnerability in html/includes/graphs/device/collectd.inc.php where user supplied parameters are filtered with the mysqli_escape_real_string function. This function is not the appropriate function to sanitize command arguments as it does not escape a number of command line syntax characters such as ` (backtick), allowing an attacker to inject commands into the variable $rrd_cmd, which gets executed via passthru().

CVE-2019-10668 librenms vulnerability CVSS: 6.4 09 Sep 2019, 13:15 UTC

An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible.

CVE-2019-10667 librenms vulnerability CVSS: 5.0 09 Sep 2019, 13:15 UTC

An issue was discovered in LibreNMS through 1.47. Information disclosure can occur: an attacker can fingerprint the exact code version installed and disclose local file paths.

CVE-2019-10666 librenms vulnerability CVSS: 6.8 09 Sep 2019, 13:15 UTC

An issue was discovered in LibreNMS through 1.47. Several of the scripts perform dynamic script inclusion via the include() function on user supplied input without sanitizing the values by calling basename() or a similar function. An attacker can leverage this to execute PHP code from the included file. Exploitation of these scripts is made difficult by additional text being appended (typically .inc.php), which means an attacker would need to be able to control both a filename and its content on the server. However, exploitation can be achieved as demonstrated by the csv.php?report=../ substring.

CVE-2019-10665 librenms vulnerability CVSS: 7.5 09 Sep 2019, 13:15 UTC

An issue was discovered in LibreNMS through 1.47. The scripts that handle the graphing options (html/includes/graphs/common.inc.php and html/includes/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php script. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files.

CVE-2019-15230 librenms vulnerability CVSS: 3.5 28 Aug 2019, 17:15 UTC

LibreNMS v1.54 has XSS in the Create User, Inventory, Add Device, Notifications, Alert Rule, Create Maintenance, and Alert Template sections of the admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account.

CVE-2018-20434 librenms vulnerability CVSS: 10.0 24 Apr 2019, 21:29 UTC

LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.

CVE-2018-20678 librenms vulnerability CVSS: 6.5 28 Mar 2019, 16:29 UTC

LibreNMS through 1.47 allows SQL injection via the html/ajax_table.php sort[hostname] parameter, exploitable by authenticated users during a search.

CVE-2018-18478 librenms vulnerability CVSS: 4.3 18 Oct 2018, 17:29 UTC

Persistent Cross-Site Scripting (XSS) issues in LibreNMS before 1.44 allow remote attackers to inject arbitrary web script or HTML via the dashboard_name parameter in the /ajax_form.php resource, related to html/includes/forms/add-dashboard.inc.php, html/includes/forms/delete-dashboard.inc.php, and html/includes/forms/edit-dashboard.inc.php.

CVE-2017-16759 librenms vulnerability CVSS: 4.3 09 Nov 2017, 22:29 UTC

The installation process in LibreNMS before 2017-08-18 allows remote attackers to read arbitrary files, related to html/install.php.