Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6pmj-xjxp-p8g9 | LibreNMS is vulnerable to SQL Injection (Boolean-Based Blind) in hostname parameter in ajax_output.php endpoint |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* |
Thu, 20 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librenms
Librenms librenms |
|
| Vendors & Products |
Librenms
Librenms librenms |
Wed, 19 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Nov 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Prior to version 25.11.0, a boolean-based blind SQL injection vulnerability was identified in the LibreNMS application at the /ajax_output.php endpoint. The hostname parameter is interpolated directly into an SQL query without proper sanitization or parameter binding, allowing an attacker to manipulate the query logic and infer data from the database through conditional responses. This issue has been patched in version 25.11.0. | |
| Title | LibreNMS is vulnerable to SQL Injection (Boolean-Based Blind) in hostname parameter in ajax_output.php endpoint | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-19T14:58:46.753Z
Reserved: 2025-11-17T20:55:34.691Z
Link: CVE-2025-65093
Updated: 2025-11-19T14:58:31.349Z
Status : Analyzed
Published: 2025-11-18T23:15:57.690
Modified: 2025-11-20T16:18:22.563
Link: CVE-2025-65093
No data.
OpenCVE Enrichment
Updated: 2025-11-20T10:30:39Z
Github GHSA