CVE-2020-14295

HIGH

Cacti - SQL Injection

Title source: rule

Description

A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.

Exploits (4)

exploitdb WORKING POC
by Leonardo Paiva · pythonwebappsphp
https://www.exploit-db.com/exploits/49810
nomisec WORKING POC 2 stars
by 0z09e · poc
https://github.com/0z09e/CVE-2020-14295
nomisec WORKING POC
by mrg3ntl3m4n · poc
https://github.com/mrg3ntl3m4n/CVE-2020-14295
metasploit WORKING POC EXCELLENT
by h00die, Leonardo Paiva, Mayfly277 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/cacti_filter_sqli_rce.rb

Scores

CVSS v3 7.2
EPSS 0.8120
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-89
Status published
Products (3)
cacti/cacti 1.2.12
fedoraproject/fedora 31
fedoraproject/fedora 32
Published Jun 17, 2020
Tracked Since Feb 18, 2026