Description
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below are affected by a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Rules workflow. An attacker with administrative privileges can inject malicious scripts that execute in the browser context of any user who accesses the Alert Rules page. This issue has been fixed in version 26.2.0.
Published: 2026-02-20
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

LibreNMS, an auto‑discovering PHP/MySQL networking tool, contains a stored cross‑site scripting flaw, classified as CWE‑79, within its Alert Rules management interface. An administrator who can edit alert rules may embed arbitrary script content that persists in the database and executes in the browsers of any user who subsequently views the Alert Rules page. The attack therefore allows privilege‑elevated insiders or compromised admin accounts to run code within the context of other legitimate users, potentially enabling session hijacking, navigation hijack, or defacement of the web interface. The vulnerability does not grant direct arbitrary code execution on the host, but it does compromise user accounts and confidentiality of visible data.

Affected Systems

All LibreNMS installations running version 25.12.0 or earlier. The Vulnerability Authority lists the affected vendor as librenms and the product as LibreNMS. The issue has been addressed in release 26.2.0, so any deployment of 26.2.0 or later is considered mitigated.

Risk and Exploitability

The vulnerability scores a moderate CVSS of 4.3 and a very low EPSS (<1%). It is not catalogued in the CISA Known Exploited Vulnerabilities list. Exploitation requires administrative credentials to inject the payload. Once injected, the script runs in the browser context of any user who accesses the Alert Rules page, yielding local‑browser attacks but not remote code execution on the server. Due to the low exploitation probability and moderate severity, the risk level is moderate but remediation is recommended before any potential exploitation is detected.

Generated by OpenCVE AI on April 17, 2026 at 17:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the LibreNMS installation to version 26.2.0 or later, which removes the stored‑XSS code path.
  • If any alerts or rules have already been injected with malicious scripts, delete or edit those entries prior to applying the patch to eliminate residual payloads.
  • Restrict the Alert Rules page and administration functions to the narrowest user group necessary; enable least‑privilege access controls and monitor for any unauthorized changes to alert configurations.

Generated by OpenCVE AI on April 17, 2026 at 17:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6xmx-xr9p-58p7 LibreNMS has a Stored XSS in Alert Rule
History

Fri, 20 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Librenms
Librenms librenms
Vendors & Products Librenms
Librenms librenms

Fri, 20 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below are affected by a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Rules workflow. An attacker with administrative privileges can inject malicious scripts that execute in the browser context of any user who accesses the Alert Rules page. This issue has been fixed in version 26.2.0.
Title LibreNMS has Stored XSS in Alert Rule
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}


Subscriptions

Librenms Librenms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-20T15:34:55.873Z

Reserved: 2026-02-17T01:41:24.606Z

Link: CVE-2026-26989

cve-icon Vulnrichment

Updated: 2026-02-20T15:26:37.884Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T02:16:54.710

Modified: 2026-02-20T16:25:20.917

Link: CVE-2026-26989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:45:24Z

Weaknesses