CVE-2021-26247

MEDIUM NUCLEI

Cacti - XSS

Title source: rule

Description

As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.

Nuclei Templates (1)

Cacti - Cross-Site Scripting
MEDIUMby dhiyaneshDK
Shodan: http.title:"login to cacti" || http.title:"cacti" || http.favicon.hash:"-1797138069"
FOFA: icon_hash="-1797138069" || title="cacti" || title="login to cacti"

Scores

CVSS v3 6.1
EPSS 0.2104
EPSS Percentile 95.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (1)
cacti/cacti 0.8.7g
Published Jan 19, 2022
Tracked Since Feb 18, 2026