Untriaged
Permalink
CVE-2026-26989
4.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
LibreNMS has Stored XSS in Alert Rule
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below are affected by a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Rules workflow. An attacker with administrative privileges can inject malicious scripts that execute in the browser context of any user who accesses the Alert Rules page. This issue has been fixed in version 26.2.0.
References
-
https://github.com/librenms/librenms/security/advisories/GHSA-6xmx-xr9p-58p7 x_refsource_CONFIRM
-
https://github.com/librenms/librenms/pull/19039 x_refsource_MISC
-
https://github.com/librenms/librenms/releases/tag/26.2.0 x_refsource_MISC
Affected products
librenms
- ==< 26.2.0
Package maintainers
-
@vidister Fiona Weber <v@vidister.de>
-
@NetaliDev Jennifer Graul <me@netali.de>
-
@n0emis Ember Keske <nixpkgs@n0emis.network>
-
@yuyuyureka Yureka <yuka@yuka.dev>
-
@johannwagner Johann Wagner <nix@wagner.digital>