CVE-2025-55296
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-18

Last updated on: 2025-09-10

Assigner: GitHub, Inc.

Description
librenms is a community-based GPL-licensed network monitoring system. A stored Cross-Site Scripting (XSS) vulnerability exists in LibreNMS (<= 25.6.0) in the Alert Template creation feature. This allows a user with the admin role to inject malicious JavaScript, which will be executed when the template is rendered, potentially compromising other admin accounts. This vulnerability is fixed in 25.8.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-18
Last Modified
2025-09-10
Generated
2026-05-07
AI Q&A
2025-08-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
librenms librenms to 25.8.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-55296 is a stored Cross-Site Scripting (XSS) vulnerability in LibreNMS versions up to 25.6.0. It occurs in the Alert Template creation feature where an admin user can inject malicious JavaScript code into the 'Template name' field. This injected script is stored and later executed when the template is rendered, potentially compromising other admin users by enabling actions like session hijacking or data theft. The vulnerability arises because user input is not properly sanitized or encoded before being displayed. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker with admin privileges to inject malicious JavaScript code that executes in the browsers of other admin users viewing the alert templates. This can lead to session hijacking, theft of sensitive information, or other malicious actions compromising the confidentiality and integrity of the system. However, it requires the attacker to have admin access and affects only admin users. The availability of the system is not impacted. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if your LibreNMS installation is running version 25.6.0 or earlier and if the Alert Template creation feature is accessible to admin users. Specifically, an admin user could attempt to create an alert template with a malicious payload such as `<script>alert(document.cookie)</script>` in the Template name field and observe if the script executes when the template is rendered. There are no specific network commands provided to detect this vulnerability automatically, but verifying the LibreNMS version and testing the alert template input sanitization manually can help detect it. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, upgrade LibreNMS to version 25.8.0 or later, where the issue has been fixed. The fix involves sanitizing user input in alert template and alert rule names by escaping HTML special characters to prevent script execution. Until the upgrade can be performed, restrict admin access to trusted users only and avoid creating or editing alert templates with untrusted input. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart