CVE-2025-54138
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-22

Last updated on: 2025-08-05

Assigner: GitHub, Inc.

Description
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. LibreNMS versions 25.6.0 and below contain an architectural vulnerability in the ajax_form.php endpoint that permits Remote File Inclusion based on user-controlled POST input. The application directly uses the type parameter to dynamically include .inc.php files from the trusted path includes/html/forms/, without validation or allowlisting. This pattern introduces a latent Remote Code Execution (RCE) vector if an attacker can stage a file in this include path β€” for example, via symlink, development misconfiguration, or chained vulnerabilities. This is fixed in version 25.7.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-22
Last Modified
2025-08-05
Generated
2026-05-07
AI Q&A
2025-07-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
librenms librenms to 25.7.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-98 The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in LibreNMS versions 25.6.0 and below in the ajax_form.php endpoint. It allows Remote File Inclusion (RFI) through a user-controlled POST parameter called 'type'. The application dynamically includes .inc.php files from a trusted directory without validating or allowlisting the input, which can lead to an attacker including malicious files if they can place them in the include path. This can result in Remote Code Execution (RCE) if exploited.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to execute arbitrary code on the server running LibreNMS. This can lead to full compromise of the system, unauthorized access to sensitive data, disruption of network monitoring services, and potential lateral movement within the network.


What immediate steps should I take to mitigate this vulnerability?

Upgrade LibreNMS to version 25.7.0 or later, as this version contains the fix for the Remote File Inclusion vulnerability in ajax_form.php. Additionally, review and restrict access to the includes/html/forms/ directory to prevent unauthorized file staging, and audit your system for any symlinks or misconfigurations that could allow an attacker to place malicious files in the include path.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart