CVE-2025-55296
BaseFortify
Publication date: 2025-08-18
Last updated on: 2025-09-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| librenms | librenms | to 25.8.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-55296 is a stored Cross-Site Scripting (XSS) vulnerability in LibreNMS versions up to 25.6.0. It occurs in the Alert Template creation feature where an admin user can inject malicious JavaScript code into the 'Template name' field. This injected script is stored and later executed when the template is rendered, potentially compromising other admin users by enabling actions like session hijacking or data theft. The vulnerability arises because user input is not properly sanitized or encoded before being displayed. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker with admin privileges to inject malicious JavaScript code that executes in the browsers of other admin users viewing the alert templates. This can lead to session hijacking, theft of sensitive information, or other malicious actions compromising the confidentiality and integrity of the system. However, it requires the attacker to have admin access and affects only admin users. The availability of the system is not impacted. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if your LibreNMS installation is running version 25.6.0 or earlier and if the Alert Template creation feature is accessible to admin users. Specifically, an admin user could attempt to create an alert template with a malicious payload such as `<script>alert(document.cookie)</script>` in the Template name field and observe if the script executes when the template is rendered. There are no specific network commands provided to detect this vulnerability automatically, but verifying the LibreNMS version and testing the alert template input sanitization manually can help detect it. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, upgrade LibreNMS to version 25.8.0 or later, where the issue has been fixed. The fix involves sanitizing user input in alert template and alert rule names by escaping HTML special characters to prevent script execution. Until the upgrade can be performed, restrict admin access to trusted users only and avoid creating or editing alert templates with untrusted input. [1, 2]