Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/cacti@0?distro=trixie
purl pkg:deb/debian/cacti@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (17)
Vulnerability Summary Aliases
VCID-8max-2avj-hkdt Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `‘managers.php’`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `‘/cacti/managers.php’` with an SQLi payload in the `‘selected_graphs_array’` HTTP GET parameter. As of time of publication, no patched versions exist. CVE-2023-51448
VCID-a1a1-zuaj-mqaa Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 are vulnerable to stored cross-site scripting, a type of cross-site scripting where malicious scripts are permanently stored on a target server and served to users who access a particular page. Version 1.2.27 contains a patch for the issue. CVE-2024-27082
VCID-a4qr-bw5v-t3hx Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-31132
VCID-bzm7-peh5-nqba Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc. CVE-2024-29895
VCID-d7t8-6cty-sqde Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39358
VCID-du4b-tbxt-mqfr Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The `data_sources.php` script displays the data source management information (e.g. data source path, polling configuration etc.) for different data visualizations of the _cacti_ app. CENSUS found that an adversary that is able to configure a malicious Device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output. CVE-2023-39366
VCID-dup5-9qdp-5udn Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146. CVE-2025-26520
VCID-h6vp-37u4-b7f3 Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39510
VCID-hdjk-szxs-5bdu Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2020-14424
VCID-mwbm-aphc-akgu Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available. CVE-2023-50250
VCID-myxu-h49e-77f1 In csrf-magic before 1.0.4, if $GLOBALS['csrf']['secret'] is not configured, the Anti-CSRF Token used is predictable and would permit an attacker to bypass the CSRF protections, because an automatically generated secret is not used. CVE-2013-7464
VCID-w11p-1pr3-7ybp Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39511
VCID-y4py-r1dd-9bcu Cacti provides an operational monitoring and fault management framework. Versions of Cacti prior to 1.2.27 contain a residual cross-site scripting vulnerability caused by an incomplete fix for CVE-2023-50250. `raise_message_javascript` from `lib/functions.php` now uses purify.js to fix CVE-2023-50250 (among others). However, it still generates the code out of unescaped PHP variables `$title` and `$header`. If those variables contain single quotes, they can be used to inject JavaScript code. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. Version 1.2.27 fixes this issue. CVE-2024-29894
VCID-ye6u-vkxs-w7fz Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the template function of host_templates.php using the graph_template parameter. This vulnerability is fixed in 1.2.29. CVE-2024-54146
VCID-yp44-k5kc-kqbd Cacti provides an operational monitoring and fault management framework. A reflected cross-site scripting vulnerability on the 1.3.x DEV branch allows attackers to obtain cookies of administrator and other users and fake their login using obtained cookies. This issue is fixed in commit a38b9046e9772612fda847b46308f9391a49891e. CVE-2024-30268
VCID-zf92-pzgz-dfg7 Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39512
VCID-znew-xktt-p7hy Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. CVE-2023-39514

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:22:59.847063+00:00 Debian Importer Fixing VCID-w11p-1pr3-7ybp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:21:34.016282+00:00 Debian Importer Fixing VCID-a1a1-zuaj-mqaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:18:26.688784+00:00 Debian Importer Fixing VCID-h6vp-37u4-b7f3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:09:06.518756+00:00 Debian Importer Fixing VCID-bzm7-peh5-nqba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:41.840626+00:00 Debian Importer Fixing VCID-d7t8-6cty-sqde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:42.455922+00:00 Debian Importer Fixing VCID-hdjk-szxs-5bdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:17.194569+00:00 Debian Importer Fixing VCID-znew-xktt-p7hy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:15:55.524094+00:00 Debian Importer Fixing VCID-myxu-h49e-77f1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:11.657037+00:00 Debian Importer Fixing VCID-8max-2avj-hkdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:08.847422+00:00 Debian Importer Fixing VCID-zf92-pzgz-dfg7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:48:25.624341+00:00 Debian Importer Fixing VCID-ye6u-vkxs-w7fz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:48.491683+00:00 Debian Importer Fixing VCID-du4b-tbxt-mqfr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:13.171593+00:00 Debian Importer Fixing VCID-mwbm-aphc-akgu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:38.215925+00:00 Debian Importer Fixing VCID-dup5-9qdp-5udn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:16:27.595933+00:00 Debian Importer Fixing VCID-a4qr-bw5v-t3hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:05.902836+00:00 Debian Importer Fixing VCID-yp44-k5kc-kqbd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:24.666849+00:00 Debian Importer Fixing VCID-y4py-r1dd-9bcu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:13:42.294925+00:00 Debian Importer Fixing VCID-w11p-1pr3-7ybp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:12:33.662608+00:00 Debian Importer Fixing VCID-a1a1-zuaj-mqaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:03.579035+00:00 Debian Importer Fixing VCID-h6vp-37u4-b7f3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:02:49.062806+00:00 Debian Importer Fixing VCID-bzm7-peh5-nqba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:33.661207+00:00 Debian Importer Fixing VCID-d7t8-6cty-sqde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:44.299283+00:00 Debian Importer Fixing VCID-hdjk-szxs-5bdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:26.142833+00:00 Debian Importer Fixing VCID-znew-xktt-p7hy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:43.567628+00:00 Debian Importer Fixing VCID-myxu-h49e-77f1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:42.498459+00:00 Debian Importer Fixing VCID-8max-2avj-hkdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:46.844677+00:00 Debian Importer Fixing VCID-zf92-pzgz-dfg7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:50.833533+00:00 Debian Importer Fixing VCID-ye6u-vkxs-w7fz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:27.021460+00:00 Debian Importer Fixing VCID-du4b-tbxt-mqfr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:09.715709+00:00 Debian Importer Fixing VCID-mwbm-aphc-akgu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:23.500904+00:00 Debian Importer Fixing VCID-dup5-9qdp-5udn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:11:54.891521+00:00 Debian Importer Fixing VCID-a4qr-bw5v-t3hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:37.826691+00:00 Debian Importer Fixing VCID-yp44-k5kc-kqbd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:33.785147+00:00 Debian Importer Fixing VCID-y4py-r1dd-9bcu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:20:10.452842+00:00 Debian Importer Fixing VCID-dup5-9qdp-5udn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:16.205426+00:00 Debian Importer Fixing VCID-w11p-1pr3-7ybp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:11.698893+00:00 Debian Importer Fixing VCID-a1a1-zuaj-mqaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:03.158702+00:00 Debian Importer Fixing VCID-h6vp-37u4-b7f3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:31.720554+00:00 Debian Importer Fixing VCID-bzm7-peh5-nqba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:12.177454+00:00 Debian Importer Fixing VCID-d7t8-6cty-sqde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:34.328346+00:00 Debian Importer Fixing VCID-hdjk-szxs-5bdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:32.273498+00:00 Debian Importer Fixing VCID-znew-xktt-p7hy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:54.489183+00:00 Debian Importer Fixing VCID-myxu-h49e-77f1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:33.950811+00:00 Debian Importer Fixing VCID-8max-2avj-hkdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:08.599146+00:00 Debian Importer Fixing VCID-zf92-pzgz-dfg7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:31.789497+00:00 Debian Importer Fixing VCID-ye6u-vkxs-w7fz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:03.435146+00:00 Debian Importer Fixing VCID-du4b-tbxt-mqfr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:52.247776+00:00 Debian Importer Fixing VCID-mwbm-aphc-akgu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:24.937606+00:00 Debian Importer Fixing VCID-a4qr-bw5v-t3hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:00.869321+00:00 Debian Importer Fixing VCID-yp44-k5kc-kqbd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:12.338899+00:00 Debian Importer Fixing VCID-y4py-r1dd-9bcu https://security-tracker.debian.org/tracker/data/json 38.1.0