CVE-2025-62411
BaseFortify
Publication date: 2025-10-16
Last updated on: 2025-10-23
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| librenms | librenms | to 25.10.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in LibreNMS versions up to 25.8.0. It occurs in the Alert Transports management functionality where the Transport name field input is stored and later displayed on the Alert Rules page without proper validation or encoding. This allows an attacker to inject arbitrary JavaScript code that executes in the administrator's browser.
How can this vulnerability impact me? :
The vulnerability can lead to arbitrary JavaScript execution in the administrator's browser, potentially allowing attackers to perform actions such as stealing session tokens, manipulating the admin interface, or executing unauthorized commands within the context of the admin user.
What immediate steps should I take to mitigate this vulnerability?
Upgrade LibreNMS to version 25.10.0 or later, as this version contains the fix for the Stored Cross-Site Scripting (XSS) vulnerability in the Alert Transports management functionality.