Search for packages
| purl | pkg:deb/debian/cacti@1.2.2%2Bds1-2%2Bdeb10u4 |
| Next non-vulnerable version | 1.2.30+ds1-1 |
| Latest non-vulnerable version | 1.2.30+ds1-1 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-34z4-1zqk-afcm
Aliases: CVE-2023-39515 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-3tqy-g42y-9fef
Aliases: CVE-2020-25706 |
A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field |
Affected by 25 other vulnerabilities. |
|
VCID-3y7d-ujep-4ydm
Aliases: CVE-2024-34340 |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls `compat_password_hash` when users set their password. `compat_password_hash` use `password_hash` if there is it, else use `md5`. When verifying password, it calls `compat_password_verify`. In `compat_password_verify`, `password_verify` is called if there is it, else use `md5`. `password_verify` and `password_hash` are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in `compat_password_verify`. Md5-hashed user input is compared with correct password in database by `$md5 == $hash`. It is a loose comparison, not `===`. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue. |
Affected by 3 other vulnerabilities. |
|
VCID-44fx-4w2y-y3dy
Aliases: CVE-2024-31458 |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `form_save()` function in `graph_template_inputs.php` is not thoroughly checked and is used to concatenate the SQL statement in `draw_nontemplated_fields_graph_item()` function from `lib/html_form_templates.php` , finally resulting in SQL injection. Version 1.2.27 contains a patch for the issue. |
Affected by 3 other vulnerabilities. |
|
VCID-4twv-1yys-eban
Aliases: CVE-2025-22604 |
Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29. |
Affected by 3 other vulnerabilities. |
|
VCID-5ykb-6nvx-k3e4
Aliases: CVE-2023-39362 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-6t6n-ws5n-wkay
Aliases: CVE-2024-31443 |
Cacti provides an operational monitoring and fault management framework. Prior to 1.2.27, some of the data stored in `form_save()` function in `data_queries.php` is not thoroughly checked and is used to concatenate the HTML statement in `grow_right_pane_tree()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue. |
Affected by 3 other vulnerabilities. |
|
VCID-6ze5-dqdn-ykg3
Aliases: CVE-2024-45598 |
Cacti is an open source performance and fault management framework. Prior to 1.2.29, an administrator can change the `Poller Standard Error Log Path` parameter in either Installation Step 5 or in Configuration->Settings->Paths tab to a local file inside the server. Then simply going to Logs tab and selecting the name of the local file will show its content on the web UI. This vulnerability is fixed in 1.2.29. |
Affected by 3 other vulnerabilities. |
|
VCID-7m68-seeq-tuae
Aliases: CVE-2025-24368 |
Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29. |
Affected by 3 other vulnerabilities. |
|
VCID-85gc-u991-z3dw
Aliases: CVE-2024-25641 |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue. |
Affected by 3 other vulnerabilities. |
|
VCID-8nbc-ethb-6kcn
Aliases: CVE-2019-17358 |
Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. |
Affected by 25 other vulnerabilities. |
|
VCID-9swv-zvke-ubet
Aliases: CVE-2020-8813 |
Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code. |
Affected by 25 other vulnerabilities. |
|
VCID-a8j1-24bw-gudu
Aliases: CVE-2023-39364 |
security update |
Affected by 25 other vulnerabilities. |
|
VCID-akj7-kh8f-97ct
Aliases: CVE-2023-49088 |
security update |
Affected by 25 other vulnerabilities. |
|
VCID-ay5a-nkmf-5yar
Aliases: CVE-2023-49086 |
security update |
Affected by 25 other vulnerabilities. |
|
VCID-be57-gxmc-vqd4
Aliases: CVE-2024-43362 |
Cacti is an open source performance and fault management framework. The `fileurl` parameter is not properly sanitized when saving external links in `links.php` . Morever, the said fileurl is placed in some html code which is passed to the `print` function in `link.php` and `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `fileurl` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this issue. |
Affected by 3 other vulnerabilities. |
|
VCID-c2b8-ss11-9yhq
Aliases: CVE-2023-39360 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-cre7-1uhc-bka2
Aliases: CVE-2019-16723 |
Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. |
Affected by 25 other vulnerabilities. |
|
VCID-cxs3-zh36-m7en
Aliases: CVE-2020-7106 |
Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. |
Affected by 25 other vulnerabilities. |
|
VCID-d7db-n89n-qyd8
Aliases: CVE-2023-49084 |
security update |
Affected by 25 other vulnerabilities. |
|
VCID-e48s-dv1e-4fgn
Aliases: CVE-2020-13231 |
In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change. |
Affected by 25 other vulnerabilities. |
|
VCID-fhtp-y9a5-vqgj
Aliases: CVE-2024-31445 |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in `automation_get_new_graphs_sql` function of `api_automation.php` allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In `api_automation.php` line 856, the `get_request_var('filter')` is being concatenated into the SQL statement without any sanitization. In `api_automation.php` line 717, The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no filter for it. Version 1.2.27 contains a patch for the issue. |
Affected by 3 other vulnerabilities. |
|
VCID-fwp2-z586-ebbq
Aliases: CVE-2019-17357 |
Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. |
Affected by 25 other vulnerabilities. |
|
VCID-h3qa-svy4-1fcr
Aliases: CVE-2023-49085 |
security update |
Affected by 25 other vulnerabilities. |
|
VCID-hj89-pnag-3fer
Aliases: CVE-2024-43363 |
Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability. |
Affected by 3 other vulnerabilities. |
|
VCID-huf2-qwju-6bf2
Aliases: CVE-2023-39365 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-jkca-shmj-mbbu
Aliases: CVE-2024-31459 |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue. |
Affected by 3 other vulnerabilities. |
|
VCID-k6z6-4pb4-tbeu
Aliases: CVE-2020-23226 |
Multiple Cross Site Scripting (XSS) vulneratiblities exist in Cacti 1.2.12 in (1) reports_admin.php, (2) data_queries.php, (3) data_input.php, (4) graph_templates.php, (5) graphs.php, (6) reports_admin.php, and (7) data_input.php. |
Affected by 25 other vulnerabilities. |
|
VCID-k7kv-za2s-dud5
Aliases: CVE-2024-31460 |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the SQL statement in `create_all_header_nodes()` function from `lib/api_automation.php` , finally resulting in SQL injection. Using SQL based secondary injection technology, attackers can modify the contents of the Cacti database, and based on the modified content, it may be possible to achieve further impact, such as arbitrary file reading, and even remote code execution through arbitrary file writing. Version 1.2.27 contains a patch for the issue. |
Affected by 3 other vulnerabilities. |
|
VCID-khhn-9sja-sfgr
Aliases: CVE-2025-24367 |
Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29. |
Affected by 3 other vulnerabilities. |
|
VCID-mebp-4rfu-vqcq
Aliases: CVE-2024-47875 GHSA-gx9m-whjm-85jf |
DOMpurify has a nesting-based mXSS DOMpurify was vulnerable to nesting-based mXSS fixed by [0ef5e537](https://github.com/cure53/DOMPurify/tree/0ef5e537a514f904b6aa1d7ad9e749e365d7185f) (2.x) and [merge 943](https://github.com/cure53/DOMPurify/pull/943) Backporter should be aware of GHSA-mmhx-hmjr-r674 (CVE-2024-45801) when cherry-picking POC is avaible under [test](https://github.com/cure53/DOMPurify/blob/0ef5e537a514f904b6aa1d7ad9e749e365d7185f/test/test-suite.js#L2098) |
Affected by 3 other vulnerabilities. |
|
VCID-pau5-hfbv-nucp
Aliases: CVE-2023-39513 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-qnz1-w7bb-97ee
Aliases: CVE-2022-41444 |
Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via crafted POST request to graphs_new.php. |
Affected by 3 other vulnerabilities. |
|
VCID-qvkt-vk55-4bbx
Aliases: CVE-2020-35701 |
A vulnerability in Cacti could lead to remote code execution. |
Affected by 25 other vulnerabilities. |
|
VCID-rftg-byj2-jkh9
Aliases: CVE-2023-37543 |
Cacti before 1.2.6 allows IDOR (Insecure Direct Object Reference) for accessing any graph via a modified local_graph_id parameter to graph_xport.php. This is a different vulnerability than CVE-2019-16723. |
Affected by 25 other vulnerabilities. |
|
VCID-s8du-gzj2-gkc1
Aliases: CVE-2024-43364 |
Cacti is an open source performance and fault management framework. The `title` parameter is not properly sanitized when saving external links in links.php . Morever, the said title parameter is stored in the database and reflected back to user in index.php, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `title` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability. |
Affected by 3 other vulnerabilities. |
|
VCID-sb43-hapb-1uf2
Aliases: CVE-2023-39357 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-ses2-y1j2-vbbx
Aliases: CVE-2020-14295 |
Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code. |
Affected by 25 other vulnerabilities. |
|
VCID-sx2t-uzae-2fh9
Aliases: CVE-2024-54145 |
Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the get_discovery_results function of automation_devices.php using the network parameter. This vulnerability is fixed in 1.2.29. |
Affected by 3 other vulnerabilities. |
|
VCID-uj1s-uuyx-mya5
Aliases: CVE-2020-7237 |
Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. |
Affected by 25 other vulnerabilities. |
|
VCID-vbs9-gben-9kgc
Aliases: CVE-2024-48910 GHSA-p3vf-v8qc-cwcr |
DOMPurify vulnerable to tampering by prototype polution dompurify was vulnerable to prototype pollution Fixed by https://github.com/cure53/DOMPurify/commit/d1dd0374caef2b4c56c3bd09fe1988c3479166dc |
Affected by 3 other vulnerabilities. |
|
VCID-vsjt-qjyw-hbfs
Aliases: CVE-2023-39359 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-wrxa-2us4-vkf9
Aliases: CVE-2020-13230 |
In Cacti before 1.2.11, disabling a user account does not immediately invalidate any permissions granted to that account (e.g., permission to view logs). |
Affected by 25 other vulnerabilities. |
|
VCID-ws4h-295a-9qgx
Aliases: CVE-2023-39516 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-xbb2-av4z-m3dp
Aliases: CVE-2022-46169 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-xdbp-7rtr-fyb7
Aliases: CVE-2024-43365 |
Cacti is an open source performance and fault management framework. The`consolenewsection` parameter is not properly sanitized when saving external links in links.php . Morever, the said consolenewsection parameter is stored in the database and reflected back to user in `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the “consolenewsection” parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability. |
Affected by 3 other vulnerabilities. |
|
VCID-xpvn-y3b8-skgb
Aliases: CVE-2022-0730 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
|
VCID-y683-kz6e-afhv
Aliases: CVE-2024-31444 |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules_form_save()` function in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the HTML statement in `form_confirm()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue. |
Affected by 3 other vulnerabilities. |
|
VCID-ypan-57sx-vyam
Aliases: CVE-2023-39361 |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
Affected by 25 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1ff1-vhuj-hkdc | Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary HTML in the group_prefix field during the creation of a new group via "Copy" method at user_group_admin.php. |
CVE-2021-3816
|
| VCID-29q9-twke-2bdx | A cross-site scripting (XSS) vulnerability exists in graph_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Graph Vertical Label. |
CVE-2018-20725
|
| VCID-2z9e-eg1f-bqg5 | Cacti before 1.1.37 has XSS because it does not properly reject unintended characters, related to use of the sanitize_uri function in lib/functions.php. |
CVE-2018-10060
|
| VCID-6n31-d4xy-d3fj | A cross-site scripting vulnerability exists in Cacti 1.1.17 in the method parameter in spikekill.php. |
CVE-2017-12927
|
| VCID-7dp4-9zks-mbgd | Cacti before 1.1.37 has XSS because it makes certain htmlspecialchars calls without the ENT_QUOTES flag (these calls occur when the html_escape function in lib/html.php is not used). |
CVE-2018-10061
|
| VCID-86gq-jsgy-8uep | Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the "new_username" field during creation of a new user via "Copy" method at user_admin.php. |
CVE-2021-23225
|
| VCID-89pf-69jk-syfk | A cross-site scripting (XSS) vulnerability exists in pollers.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname for Data Collectors. |
CVE-2018-20724
|
| VCID-8nbc-ethb-6kcn | Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. |
CVE-2019-17358
|
| VCID-9snd-k1cz-gyb5 | include/global_session.php in Cacti 1.1.25 has XSS related to (1) the URI or (2) the refresh page. |
CVE-2017-15194
|
| VCID-9vce-mkth-v3gn | Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti before 1.1.16 allows remote authenticated users to inject arbitrary web script or HTML via specially crafted HTTP Referer headers, related to the $cancel_url variable. NOTE: this vulnerability exists because of an incomplete fix (lack of the htmlspecialchars ENT_QUOTES flag) for CVE-2017-11163. |
CVE-2017-12066
|
| VCID-aajr-s1n1-4ybu | Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. |
CVE-2017-12065
|
| VCID-afss-mcgj-7bce | Cross-site scripting (XSS) vulnerability in auth_profile.php in Cacti 1.1.13 allows remote attackers to inject arbitrary web script or HTML via specially crafted HTTP Referer headers. |
CVE-2017-11691
|
| VCID-bj2d-v5dw-ykc7 | Cacti: Privilege escalation under certain conditions |
CVE-2009-4112
|
| VCID-c4w5-q88d-z3hg | Cacti before 1.1.37 has XSS because the get_current_page function in lib/functions.php relies on $_SERVER['PHP_SELF'] instead of $_SERVER['SCRIPT_NAME'] to determine a page name. |
CVE-2018-10059
|
| VCID-gdfw-gryt-8qhg | Cross-site scripting (XSS) vulnerability in link.php in Cacti 1.1.12 allows remote anonymous users to inject arbitrary web script or HTML via the id parameter, related to the die_html_input_error function in lib/html_validate.php. |
CVE-2017-10970
|
| VCID-kkn3-ars7-gkbk | A cross-site scripting (XSS) vulnerability exists in color_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Name field for a Color. |
CVE-2018-20723
|
| VCID-nbfc-ex1y-37he | A cross-site scripting (XSS) vulnerability exists in host.php (via tree.php) in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname field for Devices. |
CVE-2018-20726
|
| VCID-q88b-smmh-77ga | Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header. |
CVE-2017-16660
|
| VCID-qbvv-frc2-rqbk | lib/rrd.php in Cacti 1.1.27 allows remote authenticated administrators to execute arbitrary OS commands via the path_rrdtool parameter in an action=save request to settings.php. |
CVE-2017-16641
|
| VCID-qncj-2u1d-7bgu | In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping occurs before printing out the value of the SNMP community string (SNMP Options) in the View poller cache, leading to XSS. |
CVE-2019-11025
|
| VCID-u478-39pb-tkay | lib/html.php in Cacti before 1.1.18 has XSS via the title field of an external link added by an authenticated user. |
CVE-2017-12978
|
| VCID-w1vc-ugdq-aygx | Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti 1.1.12 allows remote authenticated users to inject arbitrary web script or HTML via specially crafted HTTP Referer headers, related to the $cancel_url variable. |
CVE-2017-11163
|
| VCID-x1fg-6mq4-d7ds | Cacti 1.1.27 allows remote authenticated administrators to read arbitrary files by placing the Log Path into a private directory, and then making a clog.php?filename= request, as demonstrated by filename=passwd (with a Log Path under /etc) to read /etc/passwd. |
CVE-2017-16661
|
| VCID-yjny-ubdp-7few | Cacti 1.1.27 has reflected XSS via the PATH_INFO to host.php. |
CVE-2017-16785
|