Vulnerability Description
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the address parameter is split into an address and a prefix, and the prefix portion is directly concatenated into the SQL query string without validation. This allows an attacker to inject arbitrary SQL commands, potentially leading to unauthorized data access or database manipulation. This issue has been fixed in version 26.2.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Librenms | Librenms | < 26.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/librenms/librenms/commit/15429580baba03ed1dd377bada1bde4b7a11Patch
- https://github.com/librenms/librenms/pull/18777Issue Tracking
- https://github.com/librenms/librenms/security/advisories/GHSA-h3rv-q4rq-pqcvExploitThird Party Advisory
FAQ
What is CVE-2026-26988?
CVE-2026-26988 is a vulnerability with a CVSS score of 9.1 (CRITICAL). LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to...
How severe is CVE-2026-26988?
CVE-2026-26988 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-26988?
Check the references section above for vendor advisories and patch information. Affected products include: Librenms Librenms.