Vulnerability Description
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Self Cross-Site Scripting (Self-XSS) vulnerability in the "Alert Templates" feature allows users to inject arbitrary JavaScript into the alert template's name. This script executes immediately upon submission but does not persist after a page refresh.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Librenms | Librenms | < 24.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/librenms/librenms/blob/0e741e365aa974a74aee6b43d1b4b759158a5cProduct
- https://github.com/librenms/librenms/blob/0e741e365aa974a74aee6b43d1b4b759158a5cProduct
- https://github.com/librenms/librenms/commit/f259edc19b9f0ccca484c60b1ba70a0bfff9Patch
- https://github.com/librenms/librenms/security/advisories/GHSA-gcgp-q2jq-fw52ExploitProduct
FAQ
What is CVE-2024-47526?
CVE-2024-47526 is a vulnerability with a CVSS score of 3.5 (LOW). LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Self Cross-Site Scripting (Self-XSS) vulnerability in the "Alert Templates" feature allows users to inject arbitrary JavaS...
How severe is CVE-2024-47526?
CVE-2024-47526 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-47526?
Check the references section above for vendor advisories and patch information. Affected products include: Librenms Librenms.