Description
Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist.
Published: 2023-12-22
Score: 8.8 High
EPSS: 91.4% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3765-1 cacti security update
Debian DSA Debian DSA DSA-5646-1 cacti security update
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.92188}

epss

{'score': 0.91404}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-25T16:34:32.330Z

Reserved: 2023-11-21T18:57:30.428Z

Link: CVE-2023-49085

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-22T17:15:07.990

Modified: 2024-11-21T08:32:47.443

Link: CVE-2023-49085

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses