Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c89f-8g7g-59wj | LibreNMS Alert Rule API Cross-Site Scripting Vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 02 Jan 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* |
Tue, 23 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librenms
Librenms librenms |
|
| Vendors & Products |
Librenms
Librenms librenms |
Tue, 23 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 23 Dec 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Prior to version 25.12.0, the Alert Rule API is vulnerable to stored cross-site scripting. Alert rules can be created or updated via LibreNMS API. The alert rule name is not properly sanitized, and can be used to inject HTML code. This issue has been patched in version 25.12.0. | |
| Title | LibreNMS Alert Rule API Cross-Site Scripting Vulnerability | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-22T23:55:13.545Z
Reserved: 2025-12-19T14:58:47.824Z
Link: CVE-2025-68614
Updated: 2025-12-22T23:55:10.409Z
Status : Analyzed
Published: 2025-12-23T00:15:43.677
Modified: 2026-01-02T18:23:30.810
Link: CVE-2025-68614
No data.
OpenCVE Enrichment
Updated: 2025-12-23T22:39:46Z
Github GHSA